First published: Wed Feb 08 2023(Updated: )
Discourse is an open source discussion platform. In affected versions a malicious user can cause a regular expression denial of service using a carefully crafted git URL. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <3.0.1 | |
Discourse Discourse | =3.1.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25167 is a vulnerability in Discourse, an open source discussion platform, that allows a malicious user to cause a regular expression denial of service using a carefully crafted git URL.
CVE-2023-25167 has a severity rating of 5.7, which is considered medium.
Discourse versions up to and excluding 3.0.1, as well as 3.1.0-beta1, are affected by CVE-2023-25167.
It is recommended to upgrade Discourse to the latest stable, beta, or tests-passed versions, which include the fix for CVE-2023-25167.
You can find more information about CVE-2023-25167 on the Discourse GitHub repository and the Discourse security advisories page.