First published: Wed Jul 03 2024(Updated: )
Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch, Oneboxing against a carefully crafted malicious URL can reduce the availability of a Discourse instance. The problem has been patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch. There are no known workarounds available for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.2.3<3.3.0.beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35227 has a severity rating that indicates it can reduce the availability of a Discourse instance.
To fix CVE-2024-35227, upgrade to Discourse version 3.2.3 or later on the stable branch or 3.3.0.beta3 on the tests-passed branch.
The impact of CVE-2024-35227 is that it allows oneboxing against a malicious URL, which can disrupt the availability of the Discourse platform.
CVE-2024-35227 affects Discourse versions prior to 3.2.3 on the stable branch and 3.3.0.beta3 on the tests-passed branch.
Yes, a patch for CVE-2024-35227 has been implemented in the subsequent Discourse releases.