First published: Fri Sep 15 2023(Updated: )
Discourse is an open-source discussion platform. Prior to version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches, a malicious user can create an unlimited number of drafts with very long draft keys which may end up exhausting the resources on the server. The issue is patched in version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches. There are no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <3.1.0 | |
Discourse Discourse | <=3.1.0 | |
Discourse Discourse | =3.1.0-beta1 | |
Discourse Discourse | =3.1.0-beta2 | |
Discourse Discourse | =3.1.0-beta3 | |
Discourse Discourse | =3.1.0-beta5 | |
Discourse Discourse | =3.1.0-beta6 | |
Discourse Discourse | =3.1.0-beta7 | |
Discourse Discourse | =3.1.0-beta8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38706 is a vulnerability in the Discourse discussion platform that allows a malicious user to create an unlimited number of drafts, leading to resource exhaustion.
CVE-2023-38706 impacts Discourse by allowing a malicious user to create excessive drafts, which can exhaust server resources.
Discourse versions up to and including 3.1.0-beta8 are affected by CVE-2023-38706.
CVE-2023-38706 has a severity rating of medium (6.5).
To mitigate CVE-2023-38706, it is recommended to upgrade to version 3.1.1 of the 'stable' branch or version 3.2.0.beta1 of the 'beta' and 'tests-passed' branches.