Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e | Patch Third Party Advisory |
https://github.com/discourse/discourse/pull/15927 | Patch Third Party Advisory |
https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv | Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-02-15T20:15:11
Updated: 2022-02-15T20:15:11
Reserved: 2022-01-19T00:00:00
Link: CVE-2022-23641
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-15T21:15:07.657
Modified: 2022-02-24T02:20:23.657
Link: CVE-2022-23641
JSON object: View
Redhat Information
No data.
CWE