First published: Tue Oct 08 2024(Updated: )
Discourse is an open source platform for community discussion. An attacker can make several XHR requests until the cache is poisoned with a response without any preloaded data. This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable anonymous cache by setting the `DISCOURSE_DISABLE_ANON_CACHE` environment variable to a non-empty value.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <latest |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47773 is considered a medium severity vulnerability that affects Discourse.
To fix CVE-2024-47773, update Discourse to the latest patched version.
CVE-2024-47773 primarily affects anonymous visitors to Discourse sites.
CVE-2024-47773 is an issue related to cache poisoning through multiple XHR requests.
Yes, a patch for CVE-2024-47773 is included in the latest release of Discourse.