Discourse's SSRF protection missing for some FastImage requests
CVE-2023-28112

8.1HIGH

Key Information:

Vendor
discourse
Status
Vendor
CVE Published:
17 March 2023

Summary

A vulnerability exists in the Discourse open-source discussion platform where user-provided URLs are passed to FastImage without adequate SSRF protections. This flaw permits attackers to establish outbound network connections from the Discourse server to private IP addresses. Sites operating on tests-passed or beta branches prior to version 3.1.0.beta3 are at risk. There is no known workaround for this issue; those who are affected are advised to update to the patched version immediately.

Affected Version(s)

discourse beta < 3.1.0.beta3 < beta 3.1.0.beta3

discourse tests-passed < 3.1.0.beta3 < tests-passed 3.1.0.beta3

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.