Discourse vulnerable to DoS via Regexp Injection in Full Name
Description
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the stable branch and version 3.2.0.beta3 of the beta and tests-passed branches, if a user has been quoted and uses a | in their full name, they might be able to trigger a bug that generates a lot of duplicate content in all the posts they've been quoted by updating their full name again. Version 3.1.3 of the stable branch and version 3.2.0.beta3 of the beta and tests-passed branches contain a patch for this issue. No known workaround exists, although one can stop the "bleeding" by ensuring users only use alphanumeric characters in their full name field.
Affected products
1- Range: < 3.1.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/discourse/discourse/commit/2ec25105179199cf80912bf011c18b8b870e1863mitrex_refsource_MISC
- github.com/discourse/discourse/commit/7d484864fe91ff79c478f57e7ddb1235d701921emitrex_refsource_MISC
- github.com/discourse/discourse/security/advisories/GHSA-hcgf-hg2g-mw78mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.