First published: Tue Feb 15 2022(Updated: )
Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23641 is considered a moderate severity vulnerability due to its potential to cause Denial of Service attacks.
To mitigate CVE-2022-23641, update Discourse to version 2.8.1 or later in the stable branch, or to version 2.9.0.beta2 or later in the beta branches.
CVE-2022-23641 allows users to trigger a Denial of Service attack by posting a streaming URL.
CVE-2022-23641 affects Discourse versions prior to 2.8.1 in the stable branch and 2.9.0.beta2 in the beta branches.
Yes, CVE-2022-23641 can be easily exploited by posting specially crafted URLs to the Discourse platform.