Discourse vulnerable to SSRF protection bypass possible with IPv4-mapped IPv6 addresses
CVE-2023-28111
7.5HIGH
Summary
The Discourse platform contains a server-side request forgery (SSRF) vulnerability that allows attackers to bypass security restrictions for private IPv4 addresses by using IPv4-mapped IPv6 addresses. This vulnerability affects versions prior to 3.1.0.beta3 on the beta and tests-passed branches. Users are encouraged to upgrade to the patched versions immediately to safeguard their systems against potential exploitation. As of now, there are no known workarounds for this issue.
Affected Version(s)
discourse beta < 3.1.0.beta3 < beta 3.1.0.beta3
discourse tests-passed < 3.1.0.beta3 < tests-passed 3.1.0.beta3
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved