Discourse's SSRF protection missing for some FastImage requests
CVE-2023-28112
8.1HIGH
Summary
A vulnerability exists in the Discourse open-source discussion platform where user-provided URLs are passed to FastImage without adequate SSRF protections. This flaw permits attackers to establish outbound network connections from the Discourse server to private IP addresses. Sites operating on tests-passed
or beta
branches prior to version 3.1.0.beta3 are at risk. There is no known workaround for this issue; those who are affected are advised to update to the patched version immediately.
Affected Version(s)
discourse beta < 3.1.0.beta3 < beta 3.1.0.beta3
discourse tests-passed < 3.1.0.beta3 < tests-passed 3.1.0.beta3
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved