fkie_cve-2024-53851
Vulnerability from fkie_nvd
Published
2025-02-04 22:15
Modified
2025-02-04 22:15
Severity ?
Summary
Discourse is an open source platform for community discussion. In affected versions the endpoint for generating inline oneboxes for URLs wasn't enforcing limits on the number of URLs that it accepted, allowing a malicious user to inflict denial of service on some parts of the app. This vulnerability is only exploitable by authenticated users. This issue has been patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. Users unable to upgrade should turn off the `enable inline onebox on all domains` site setting and remove all entries from the `allowed inline onebox domains` site setting.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Discourse is an open source platform for community discussion. In affected versions the endpoint for generating inline oneboxes for URLs wasn\u0027t enforcing limits on the number of URLs that it accepted, allowing a malicious user to inflict denial of service on some parts of the app. This vulnerability is only exploitable by authenticated users. This issue has been patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. Users unable to upgrade should turn off the `enable inline onebox on all domains` site setting and remove all entries from the `allowed inline onebox domains` site setting." }, { "lang": "es", "value": "Discourse es una plataforma de c\u00f3digo abierto para debates comunitarios. En las versiones afectadas, el endpoint para generar casillas de verificaci\u00f3n en l\u00ednea para URL no impon\u00eda l\u00edmites en la cantidad de URL que aceptaba, lo que permit\u00eda a un usuario malintencionado infligir una denegaci\u00f3n de servicio en algunas partes de la aplicaci\u00f3n. Esta vulnerabilidad solo la pueden explotar los usuarios autenticados. Este problema se ha corregido en las \u00faltimas versiones estables, beta y de pruebas aprobadas de Discourse. Se recomienda a los usuarios que actualicen la versi\u00f3n. Los usuarios que no puedan actualizar la versi\u00f3n deben desactivar la configuraci\u00f3n del sitio `habilitar casillas de verificaci\u00f3n en l\u00ednea en todos los dominios` y eliminar todas las entradas de la configuraci\u00f3n del sitio `dominios de casillas de verificaci\u00f3n en l\u00ednea permitidos`." } ], "id": "CVE-2024-53851", "lastModified": "2025-02-04T22:15:40.490", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-02-04T22:15:40.490", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/discourse/discourse/commit/416ec83ae57924d721e6e374f4cda78bd77a4599" }, { "source": "security-advisories@github.com", "url": "https://github.com/discourse/discourse/security/advisories/GHSA-49rv-574x-wgpc" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.