First published: Mon Aug 01 2022(Updated: )
Discourse is the an open source discussion platform. In affected versions a maliciously crafted request for static assets could cause error responses to be cached by Discourse's default NGINX proxy configuration. A corrected NGINX configuration is included in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <2.8.7 | |
Discourse | =2.9.0-beta7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31182 has a severity rating that may vary based on target configuration and environment but is generally considered a medium risk due to potential information leakage.
To fix CVE-2022-31182, update to the latest stable version of Discourse or modify the NGINX configuration as recommended in the advisory.
CVE-2022-31182 affects Discourse versions prior to 2.8.7 and the 2.9.0-beta7 version.
CVE-2022-31182 can allow a maliciously crafted request for static assets to cause error responses to be cached.
Yes, a corrected NGINX configuration is included in the latest stable release of Discourse to mitigate CVE-2022-31182.