Unrated severityNVD Advisory· Published Mar 17, 2023· Updated Feb 25, 2025
Discourse vulnerable to SSRF protection bypass possible with IPv4-mapped IPv6 addresses
CVE-2023-28111
Description
Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the beta and tests-passed branches, attackers are able to bypass Discourse's server-side request forgery (SSRF) protection for private IPv4 addresses by using a IPv4-mapped IPv6 address. The issue is patched in the latest beta and tests-passed version of Discourse. version 3.1.0.beta3 of the beta and tests-passed branches. There are no known workarounds.
Affected products
1- Range: beta < 3.1.0.beta3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/discourse/discourse/commit/fd16eade7fcc6bba4b71e71106a2eb13cdfdae4amitrex_refsource_MISC
- github.com/discourse/discourse/pull/20710mitrex_refsource_MISC
- github.com/discourse/discourse/security/advisories/GHSA-26h3-8ww8-v5fcmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.