CVE-2023-28112
Published on: Not Yet Published
Last Modified on: 03/17/2023 07:15:00 PM UTC
Certain versions of Discourse from Discourse contain the following vulnerability:
Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
- CVE-2023-28112 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
discourse - discourse version = beta < 3.1.0.beta3
- Affected Vendor/Software:
discourse - discourse version = tests-passed < 3.1.0.beta3
CVE References
Description | Tags ⓘ | Link |
---|---|---|
SECURITY: Add FinalDestination::FastImage that's SSRF safe · discourse/[email protected] · GitHub | github.com text/html |
![]() |
SECURITY: Multiple commits for version bump beta3 by oblakeerickson · Pull Request #20710 · discourse/discourse · GitHub | github.com text/html |
![]() |
SSRF protection missing for some FastImage requests · Advisory · discourse/discourse · GitHub | github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Discourse | discourse | = beta < 3.1.0.beta3 |
Discourse | discourse | = tests-passed < 3.1.0.beta3 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-28112 : Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `t… twitter.com/i/web/status/1… | 2023-03-17 19:04:16 |