Discourse vulnerable to SSRF protection bypass possible with IPv4-mapped IPv6 addresses
CVE-2023-28111

5.7MEDIUM

Key Information:

Vendor

Discourse

Status
Vendor
CVE Published:
17 March 2023

What is CVE-2023-28111?

The Discourse platform contains a server-side request forgery (SSRF) vulnerability that allows attackers to bypass security restrictions for private IPv4 addresses by using IPv4-mapped IPv6 addresses. This vulnerability affects versions prior to 3.1.0.beta3 on the beta and tests-passed branches. Users are encouraged to upgrade to the patched versions immediately to safeguard their systems against potential exploitation. As of now, there are no known workarounds for this issue.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

discourse beta < 3.1.0.beta3 < beta 3.1.0.beta3

discourse tests-passed < 3.1.0.beta3 < tests-passed 3.1.0.beta3

References

CVSS V3.1

Score:
5.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.