No rate limits on POST /uploads endpoint in Discourse
Description
Discourse is an open source platform for community discussion. Without a rate limit on the POST /uploads endpoint, it makes it easier for an attacker to carry out a DoS attack on the server since creating an upload can be a resource intensive process. Do note that the impact varies from site to site as various site settings like max_image_size_kb, max_attachment_size_kb and max_image_megapixels will determine the amount of resources used when creating an upload. The issue is patched in the latest stable, beta and tests-passed version of Discourse. Users are advised to upgrade. Users unable to upgrade should reduce max_image_size_kb, max_attachment_size_kb and max_image_megapixels as smaller uploads require less resources to process. Alternatively, client_max_body_size can be reduced in Nginx to prevent large uploads from reaching the server.
Affected products
1- Range: stable <= 3.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/discourse/discourse/commit/003b80e62f97cd8c0114d6b9d3f93c10443e6faemitrex_refsource_MISC
- github.com/discourse/discourse/security/advisories/GHSA-58vw-246g-fjj4mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.