First published: Wed Jul 03 2024(Updated: )
Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta4 on the `beta` and `tests-passed` branches, a malicious actor could get the FastImage library to redirect requests to an internal Discourse IP. This issue is patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta4 on the `beta` and `tests-passed` branches. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.2.3 | |
Discourse | <3.3.0 | |
Discourse | =3.3.0-beta1 | |
Discourse | =3.3.0-beta2 | |
Discourse | =3.3.0-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37157 has a high severity rating due to the potential for internal IP redirection.
To fix CVE-2024-37157, update to Discourse version 3.2.3 or higher on the stable branch or 3.3.0.beta4 or higher on the beta branch.
CVE-2024-37157 affects Discourse versions prior to 3.2.3 on the stable branch and versions up to 3.3.0-beta3 on the beta branch.
CVE-2024-37157 allows a malicious actor to redirect requests to an internal Discourse IP by exploiting the FastImage library.
Yes, CVE-2024-37157 has been patched in the latest versions of Discourse.