First published: Fri Aug 30 2024(Updated: )
discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Calendar plugin | <2024-08-28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21658 is categorized as a medium severity vulnerability due to its potential to cause excessive bandwidth and disk space usage.
To fix CVE-2024-21658, you should update the Discourse Calendar plugin to a version released after August 28, 2024.
CVE-2024-21658 can lead to increased bandwidth consumption and disk space exhaustion due to overly generous region value limits.
Yes, CVE-2024-21658 affects all versions of the Discourse Calendar plugin prior to the version released on August 28, 2024.
Any Discourse instance using the vulnerable versions of the Discourse Calendar plugin is at risk from CVE-2024-21658.