First published: Mon Oct 07 2024(Updated: )
Discourse is an open source platform for community discussion. A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance. This problem has been patched in the latest version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.3.1 | |
Discourse | <=3.4.0 | |
Discourse | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-43789 is considered moderate as it can reduce the availability of a Discourse instance.
To fix CVE-2024-43789, you should update to the latest version of Discourse that includes the patch.
CVE-2024-43789 affects Discourse versions prior to 3.3.1 and between 3.4.0 beta versions.
The potential impact of CVE-2024-43789 is a reduction in the availability and performance of the Discourse platform.
Yes, CVE-2024-43789 can be exploited by users creating posts with excessive replies, impacting the server's availability.