First published: Tue Feb 04 2025(Updated: )
Discourse is an open source platform for community discussion. In affected versions the endpoint for generating inline oneboxes for URLs wasn't enforcing limits on the number of URLs that it accepted, allowing a malicious user to inflict denial of service on some parts of the app. This vulnerability is only exploitable by authenticated users. This issue has been patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. Users unable to upgrade should turn off the `enable inline onebox on all domains` site setting and remove all entries from the `allowed inline onebox domains` site setting.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53851 is classified as a denial of service vulnerability due to its potential to disrupt the application's functionality.
To fix CVE-2024-53851, update to the latest version of Discourse where the vulnerability has been addressed.
CVE-2024-53851 affects all versions of Discourse prior to the release that includes the security patch.
CVE-2024-53851 impacts the endpoint that generates inline oneboxes for URLs, leading to potential performance issues.
Any Discourse user utilizing affected versions may experience a denial of service due to this vulnerability.