First published: Fri Jan 12 2024(Updated: )
Discourse is a platform for community discussion. For fields that are client editable, limits on sizes are not imposed. This allows a malicious actor to cause a Discourse instance to use excessive disk space and also often excessive bandwidth. The issue is patched 3.1.4 and 3.2.0.beta4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.1.4 | |
Discourse | =3.2.0-beta1 | |
Discourse | =3.2.0-beta2 | |
Discourse | =3.2.0-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21655 has been classified as a medium severity vulnerability due to its potential to exhaust disk space and bandwidth.
To fix CVE-2024-21655, update your Discourse instance to version 3.1.4 or later, or 3.2.0-beta4 or later.
If CVE-2024-21655 is exploited, it can lead to excessive disk usage and bandwidth consumption, impacting the performance of the Discourse instance.
CVE-2024-21655 affects Discourse versions prior to 3.1.4 and beta versions up to 3.2.0-beta3.
There are no specific mitigations for CVE-2024-21655 aside from updating to an unaffected version.