CVE-2022-23641
Vulnerability from cvelistv5
Published
2022-02-15 20:15
Modified
2024-08-03 03:51
Severity ?
EPSS score ?
Summary
Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/discourse/discourse/pull/15927 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/discourse/discourse/pull/15927 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv | Issue Tracking, Third Party Advisory |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T03:51:44.191Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/discourse/discourse/pull/15927", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "discourse", vendor: "discourse", versions: [ { status: "affected", version: "stable <= 2.8.0", }, { status: "affected", version: "beta <= 2.9.0.beta1", }, { status: "affected", version: "tests-passed <= 2.9.0.beta1", }, ], }, ], descriptions: [ { lang: "en", value: "Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-835", description: "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-15T20:15:11", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/discourse/discourse/pull/15927", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e", }, ], source: { advisory: "GHSA-22xw-f62v-cfxv", discovery: "UNKNOWN", }, title: "Denial of Service in Discourse", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2022-23641", STATE: "PUBLIC", TITLE: "Denial of Service in Discourse", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "discourse", version: { version_data: [ { version_value: "stable <= 2.8.0", }, { version_value: "beta <= 2.9.0.beta1", }, { version_value: "tests-passed <= 2.9.0.beta1", }, ], }, }, ], }, vendor_name: "discourse", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv", refsource: "CONFIRM", url: "https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv", }, { name: "https://github.com/discourse/discourse/pull/15927", refsource: "MISC", url: "https://github.com/discourse/discourse/pull/15927", }, { name: "https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e", refsource: "MISC", url: "https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e", }, ], }, source: { advisory: "GHSA-22xw-f62v-cfxv", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2022-23641", datePublished: "2022-02-15T20:15:11", dateReserved: "2022-01-19T00:00:00", dateUpdated: "2024-08-03T03:51:44.191Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-23641\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-02-15T21:15:07.657\",\"lastModified\":\"2024-11-21T06:48:59.933\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.\"},{\"lang\":\"es\",\"value\":\"Discourse es una plataforma de debate de código abierto. En las versiones anteriores a 2.8.1 en la rama \\\"stable\\\", versión 2.9.0.beta2 en la rama \\\"beta\\\" y versión 2.9.0.beta2 en la rama \\\"tests-passed\\\", los usuarios pueden desencadenar un ataque de Denegación de Servicio al publicar una URL en streaming. El análisis de Oneboxes en el trabajo de fondo desencadena un bucle infinito, que causa pérdidas de memoria. Este problema está parcheado en versión 2.8.1 de la rama \\\"stable\\\", en versión 2.9.0.beta2 de la rama \\\"beta\\\" y en versión 2.9.0.beta2 de la rama \\\"tests-passed\\\". Como medida de mitigación, deshabilite por completo el onebox en el panel de administración o especifique la lista de dominios permitidos para el oneboxing\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.8.1\",\"matchCriteriaId\":\"F30E662C-449F-46D7-BB7B-6DF48073B795\"}]}]}],\"references\":[{\"url\":\"https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/pull/15927\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/pull/15927\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.