First published: Thu Jan 05 2023(Updated: )
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, parsing posts can be susceptible to regular expression denial of service (ReDoS) attacks. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <2.8.14 | |
Discourse Discourse | =2.9.0-beta1 | |
Discourse Discourse | =2.9.0-beta10 | |
Discourse Discourse | =2.9.0-beta11 | |
Discourse Discourse | =2.9.0-beta12 | |
Discourse Discourse | =2.9.0-beta13 | |
Discourse Discourse | =2.9.0-beta14 | |
Discourse Discourse | =2.9.0-beta2 | |
Discourse Discourse | =2.9.0-beta3 | |
Discourse Discourse | =2.9.0-beta4 | |
Discourse Discourse | =2.9.0-beta5 | |
Discourse Discourse | =2.9.0-beta6 | |
Discourse Discourse | =2.9.0-beta7 | |
Discourse Discourse | =2.9.0-beta8 | |
Discourse Discourse | =3.0.0-beta15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23548 is a vulnerability in the Discourse discussion platform that can be exploited by regular expression denial of service (ReDoS) attacks.
CVE-2022-23548 has a severity rating of 6.5, which is considered medium.
Versions up to 2.8.14 on the 'stable' branch and versions 2.9.0.beta16 on the 'beta' and 'tests-passed' branches of Discourse are affected.
You can fix CVE-2022-23548 by updating your Discourse installation to version 2.8.14 for the 'stable' branch and version 2.9.0.beta16 for the 'beta' and 'tests-passed' branches.
You can find more information about CVE-2022-23548 in the following references: [GitHub Pull Request](https://github.com/discourse/discourse/pull/19737) and [GitHub Security Advisory](https://github.com/discourse/discourse/security/advisories/GHSA-7rw2-f4x7-7pxf).