We found results for “”
CVE-2022-39241
Date: November 1, 2022
Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest "stable", "beta", and "test-passed" versions are now patched. As a workaround, self-hosters can use "DISCOURSE_BLOCKED_IP_BLOCKS" env var (which overrides "blocked_ip_blocks" setting) to stop webhooks from accessing private IPs.
Language: Ruby
Severity Score
Severity Score
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
CWE-918CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


