cve-2024-21655
Vulnerability from cvelistv5
Published
2024-01-12 20:46
Modified
2024-08-01 22:27
Severity ?
EPSS score ?
Summary
Discourse is a platform for community discussion. For fields that are client editable, limits on sizes are not imposed. This allows a malicious actor to cause a Discourse instance to use excessive disk space and also often excessive bandwidth. The issue is patched 3.1.4 and 3.2.0.beta4.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/discourse/discourse/security/advisories/GHSA-m5fc-94mm-38fx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/discourse/discourse/security/advisories/GHSA-m5fc-94mm-38fx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "discourse", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003c 3.1.4" }, { "status": "affected", "version": "\u003e= 3.2.0beta1, \u003c 3.2.0.beta4" } ] } ], "descriptions": [ { "lang": "en", "value": "Discourse is a platform for community discussion. For fields that are client editable, limits on sizes are not imposed. This allows a malicious actor to cause a Discourse instance to use excessive disk space and also often excessive bandwidth. The issue is patched 3.1.4 and 3.2.0.beta4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T20:46:00.196Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/discourse/discourse/security/advisories/GHSA-m5fc-94mm-38fx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/discourse/discourse/security/advisories/GHSA-m5fc-94mm-38fx" } ], "source": { "advisory": "GHSA-m5fc-94mm-38fx", "discovery": "UNKNOWN" }, "title": "Insufficient control of custom field value sizes" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-21655", "datePublished": "2024-01-12T20:46:00.196Z", "dateReserved": "2023-12-29T16:10:20.366Z", "dateUpdated": "2024-08-01T22:27:36.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-21655\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-01-12T21:15:11.510\",\"lastModified\":\"2024-11-21T08:54:48.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Discourse is a platform for community discussion. For fields that are client editable, limits on sizes are not imposed. This allows a malicious actor to cause a Discourse instance to use excessive disk space and also often excessive bandwidth. The issue is patched 3.1.4 and 3.2.0.beta4.\"},{\"lang\":\"es\",\"value\":\"Discourse es una plataforma para la discusi\u00f3n comunitaria. Para los campos que el cliente puede editar, no se imponen l\u00edmites de tama\u00f1o. Esto permite que un actor malintencionado haga que una instancia de Discourse utilice espacio en disco excesivo y, a menudo, tambi\u00e9n ancho de banda excesivo. El problema est\u00e1 parcheado en 3.1.4 y 3.2.0.beta4.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*\",\"versionEndExcluding\":\"3.1.4\",\"matchCriteriaId\":\"A51406A4-A2FE-4BFE-8EA0-58359582D6A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*\",\"matchCriteriaId\":\"1BFF647B-6CEF-43BF-BF5E-C82B557F78E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:3.2.0:beta2:*:*:beta:*:*:*\",\"matchCriteriaId\":\"10D931DE-F8F5-4A34-A30A-FDD4420ABD1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:3.2.0:beta3:*:*:beta:*:*:*\",\"matchCriteriaId\":\"C62C36D4-6CE7-4A57-BBF7-8066CFAE342A\"}]}]}],\"references\":[{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-m5fc-94mm-38fx\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-m5fc-94mm-38fx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.