First published: Tue Jan 04 2022(Updated: )
Discourse is an open source platform for community discussion. In affected versions admins users can trigger a Denial of Service attack via the `/message-bus/_diagnostics` path. The impact of this vulnerability is greater on multisite Discourse instances (where multiple forums are served from a single application server) where any admin user on any of the forums are able to visit the `/message-bus/_diagnostics` path. The problem has been patched. Please upgrade to 2.8.0.beta10 or 2.7.12. No workarounds for this issue exist.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <2.7.12 | |
Discourse | =2.8.0-beta1 | |
Discourse | =2.8.0-beta2 | |
Discourse | =2.8.0-beta3 | |
Discourse | =2.8.0-beta4 | |
Discourse | =2.8.0-beta5 | |
Discourse | =2.8.0-beta6 | |
Discourse | =2.8.0-beta7 | |
Discourse | =2.8.0-beta8 | |
Discourse | =2.8.0-beta9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43850 has the potential to cause a Denial of Service attack, especially impacting multisite Discourse instances.
To remediate CVE-2021-43850, update Discourse to a version greater than 2.7.12 or use the latest beta release.
Versions of Discourse up to 2.7.12 and certain 2.8.0 beta releases are affected by CVE-2021-43850.
Yes, CVE-2021-43850 poses a greater risk for multisite Discourse installations.
CVE-2021-43850 can be exploited via the '/message-bus/_diagnostics' path to trigger a Denial of Service.