CVE-2023-28111
Published on: Not Yet Published
Last Modified on: 03/17/2023 05:15:00 PM UTC
Certain versions of Discourse from Discourse contain the following vulnerability:
Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, attackers are able to bypass Discourse's server-side request forgery (SSRF) protection for private IPv4 addresses by using a IPv4-mapped IPv6 address. The issue is patched in the latest beta and tests-passed version of Discourse. version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
- CVE-2023-28111 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
discourse - discourse version = beta < 3.1.0.beta3
- Affected Vendor/Software:
discourse - discourse version = tests-passed < 3.1.0.beta3
CVE References
Description | Tags ⓘ | Link |
---|---|---|
SECURITY: Multiple commits for version bump beta3 by oblakeerickson · Pull Request #20710 · discourse/discourse · GitHub | github.com text/html |
![]() |
SECURITY: SSRF protection bypass with IPv4-mapped IPv6 addresses · discourse/[email protected] · GitHub | github.com text/html |
![]() |
SSRF protection bypass possible with IPv4-mapped IPv6 addresses · Advisory · discourse/discourse · GitHub | github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Discourse | discourse | = beta < 3.1.0.beta3 |
Discourse | discourse | = tests-passed < 3.1.0.beta3 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-28111 : Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `t… twitter.com/i/web/status/1… | 2023-03-17 17:02:17 |
![]() |
CVE-2023-28111 | 2023-03-17 17:38:07 |