Denial of Service Vulnerability in Discourse by Open Source Community
CVE-2024-53851
Summary
Discourse, an open-source community discussion platform, suffers from a denial of service vulnerability due to improper URL limit enforcement in its inline onebox generation feature. Authenticated users can exploit this by sending excessive URL requests, potentially leading to service disruption. This issue has been mitigated in the latest stable, beta, and tests-passed releases of Discourse. Users unable to upgrade should disable the inline onebox feature for all domains and clear the allowed inline onebox domains to safeguard against this vulnerability.
Affected Version(s)
discourse stable: <= 3.3.2 <= stable: 3.3.2
discourse beta: <= 3.4.0.beta3 <= beta: 3.4.0.beta3
discourse tests-passed: <= 3.4.0.beta3 <= tests-passed: 3.4.0.beta3
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved