icon

We found results for “

CVE-2022-39241

Date: November 1, 2022

Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest "stable", "beta", and "test-passed" versions are now patched. As a workaround, self-hosters can use "DISCOURSE_BLOCKED_IP_BLOCKS" env var (which overrides "blocked_ip_blocks" setting) to stop webhooks from accessing private IPs.

Language: Ruby

Severity Score

Severity Score

Weakness Type (CWE)

Server-Side Request Forgery (SSRF)

CWE-918

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us