First published: Tue Jul 30 2024(Updated: )
Discourse is an open source discussion platform. Prior to 3.2.5 and 3.3.0.beta5, crafting requests to submit very long tag group names can reduce the availability of a Discourse instance. This vulnerability is fixed in 3.2.5 and 3.3.0.beta5.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.2.5 | |
Discourse | =3.3.0-beta1 | |
Discourse | =3.3.0-beta2 | |
Discourse | =3.3.0-beta3 | |
Discourse | =3.3.0-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37299 has a moderate severity level as it can impact the availability of a Discourse instance.
To fix CVE-2024-37299, update your Discourse installation to version 3.2.5 or later, or to 3.3.0.beta5 or later.
CVE-2024-37299 affects Discourse versions prior to 3.2.5 and versions 3.3.0.beta1 through 3.3.0.beta4.
CVE-2024-37299 involves crafting requests with excessively long tag group names.
CVE-2024-37299 can reduce the availability of your Discourse instance, potentially leading to downtime.