First published: Tue Apr 18 2023(Updated: )
Discourse is an open source platform for community discussion. In affected versions a user logged as an administrator can call arbitrary methods on the `SiteSetting` class, notably `#clear_cache!` and `#notify_changed!`, which when done on a multisite instance, can affect the entire cluster resulting in a denial of service. Users not running in multisite environments are not affected. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <=3.0.1 | |
Discourse Discourse | <3.1.0 | |
Discourse Discourse | =3.1.0-beta1 | |
Discourse Discourse | =3.1.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30606 is a vulnerability in Discourse that allows an administrator user to call arbitrary methods on the `SiteSetting` class, potentially affecting the entire cluster.
CVE-2023-30606 allows an administrator user to call arbitrary methods on the `SiteSetting` class, which can impact the entire cluster in a multisite instance of Discourse.
The severity of CVE-2023-30606 is medium with a CVSS score of 4.9.
Discourse versions up to and including 3.0.1 stable, and up to but excluding 3.1.0 beta are affected by CVE-2023-30606.
To fix CVE-2023-30606, it is recommended to update to a patched version of Discourse.