First published: Fri Mar 17 2023(Updated: )
Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, attackers are able to bypass Discourse's server-side request forgery (SSRF) protection for private IPv4 addresses by using a IPv4-mapped IPv6 address. The issue is patched in the latest beta and tests-passed version of Discourse. version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <3.1.0 | |
Discourse Discourse | =3.1.0-beta1 | |
Discourse Discourse | =3.1.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28111 is a vulnerability in the Discourse open-source discussion platform that allows attackers to bypass server-side request forgery (SSRF) protection.
CVE-2023-28111 affects Discourse versions up to and including 3.1.0-beta2, allowing attackers to bypass SSRF protection for private IPv4 addresses.
CVE-2023-28111 has a severity rating of 7.5 (high).
Yes, the issue is patched in version 3.1.0.beta3 of the beta and tests-passed branches.
You can find more information about CVE-2023-28111 in the following references: [link1], [link2], [link3].