First published: Fri Jan 12 2024(Updated: )
Discourse is a platform for community discussion. The message serializer uses the full list of expanded chat mentions (@all and @here) which can lead to a very long array of users. This issue was patched in versions 3.1.4 and beta 3.2.0.beta5.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.1.4 | |
Discourse | =3.2.0-beta1 | |
Discourse | =3.2.0-beta2 | |
Discourse | =3.2.0-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48297 has a medium severity rating due to its potential to create excessively long arrays of users.
To fix CVE-2023-48297, upgrade to version 3.1.4 or later, or to beta version 3.2.0.beta5 or later.
CVE-2023-48297 affects Discourse versions prior to 3.1.4 and beta versions before 3.2.0.beta5.
CVE-2023-48297 involves the message serializer in Discourse which can potentially handle too many expanded chat mentions.
As of now, there are no publicly known exploits for CVE-2023-48297, but it's recommended to apply patches promptly.