Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, in multiple controller actions, Discourse accepts limit params but does not impose any upper bound on the values being accepted. Without an upper bound, the software may allow arbitrary users to generate DB queries which may end up exhausting the resources on the server. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-07-28 16:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38684
Mitre link : CVE-2023-38684
CVE.ORG link : CVE-2023-38684
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-770
Allocation of Resources Without Limits or Throttling