First published: Fri Nov 10 2023(Updated: )
Discourse is an open source platform for community discussion. In versions 3.1.0 through 3.1.2 of the `stable` branch and versions 3.1.0,beta6 through 3.2.0.beta2 of the `beta` and `tests-passed` branches, Redis memory can be depleted by crafting a site with an abnormally long favicon URL and drafting multiple posts which Onebox it. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
>=3.1.0<3.1.3 | ||
=3.1.0-beta6 | ||
=3.1.0-beta7 | ||
=3.1.0-beta8 | ||
=3.2.0-beta1 | ||
=3.2.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47120 is a vulnerability in the Discourse platform that allows an attacker to deplete Redis memory by crafting a site with an abnormally long favicon URL.
Versions 3.1.0 through 3.1.2 of the stable branch and versions 3.1.0-beta6 through 3.2.0-beta2 of the beta and tests-passed branches are affected by CVE-2023-47120.
CVE-2023-47120 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2023-47120 by crafting a site with an abnormally long favicon URL, which depletes Redis memory.
Yes, Discourse has released patches to fix CVE-2023-47120. It is recommended to update to the latest version of Discourse to mitigate the vulnerability.