Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, in multiple controller actions, Discourse accepts limit params but does not impose any upper bound on the values being accepted. Without an upper bound, the software may allow arbitrary users to generate DB queries which may end up exhausting the resources on the server. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability.
History

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-07-28T15:25:41.132Z

Updated: 2024-10-10T16:03:56.849Z

Reserved: 2023-07-24T16:19:28.363Z

Link: CVE-2023-38684

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:56.500Z

cve-icon NVD

Status : Modified

Published: 2023-07-28T16:15:12.290

Modified: 2024-11-21T08:14:02.853

Link: CVE-2023-38684

cve-icon Redhat

No data.