Malicious requests can fill up the log files resulting in a deinal of service in Discourse
CVE-2023-44388

7.5HIGH

Key Information:

Vendor
Discourse
Status
Vendor
CVE Published:
16 October 2023

Summary

A vulnerability in the Discourse open source platform allows a malicious request to rapidly fill production log files, potentially leading to server disk space exhaustion. This situation can disrupt service availability for users. Administrators can mitigate this issue by updating to the patched versions 3.1.1 or 3.2.0.beta2, or by temporarily reducing the 'client_max_body_size' directive in their nginx configuration to limit the size of upload requests. For detailed mitigation strategies, consult the linked resources.

Affected Version(s)

discourse stable <= 3.1.1 <= stable 3.1.1

discourse beta <= 3.2.0.beta2 <= beta 3.2.0.beta2

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.