Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest `stable`, `beta`, and `test-passed` versions are now patched. As a workaround, self-hosters can use `DISCOURSE_BLOCKED_IP_BLOCKS` env var (which overrides `blocked_ip_blocks` setting) to stop webhooks from accessing private IPs.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-11-02T00:00:00

Updated: 2022-11-02T00:00:00

Reserved: 2022-09-02T00:00:00


Link: CVE-2022-39241

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-11-02T17:15:17.187

Modified: 2022-11-04T15:37:26.590


Link: CVE-2022-39241

JSON object: View

cve-icon Redhat Information

No data.

CWE