First published: Mon Jul 15 2024(Updated: )
Discourse is an open source platform for community discussion. In affected versions by creating replacement words with an almost unlimited number of characters, a moderator can reduce the availability of a Discourse instance. This issue has been addressed in stable version 3.2.3 and in current betas. Users are advised to upgrade. Users unable to upgrade may manually remove the long watched words either via SQL or Rails console.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38360 has been classified with a severity that indicates potential disruptions to the availability of Discourse instances.
To fix CVE-2024-38360, upgrade your Discourse installation to version 3.2.3 or later.
CVE-2024-38360 affects all versions of Discourse prior to version 3.2.3.
CVE-2024-38360 exploits the ability to create overly long replacement words, impacting the performance of Discourse instances.
Yes, CVE-2024-38360 can potentially reduce the availability of a Discourse instance, leading to performance issues.