Denial of service via Staff Actions in Discourse
Description
Discourse is an open source platform for community discussion. In affected versions the endpoints for suspending users, silencing users and exporting CSV files weren't enforcing limits on the sizes of the parameters that they accept. This could lead to excessive resource consumption which could render an instance inoperable. A site could be disrupted by either a malicious moderator on the same site or a malicious staff member on another site in the same multisite cluster. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected products
1- Range: stable <= 3.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/discourse/discourse/commit/8cade1e825e90a66f440e820992d43c6905f4b47mitrex_refsource_MISC
- github.com/discourse/discourse/security/advisories/GHSA-xq4v-qg27-gxgcmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.