CVE-2022-23548
CVSS V2 None
CVSS V3 None
Description
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, parsing posts can be susceptible to regular expression denial of service (ReDoS) attacks. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds.
Overview
- CVE ID
- CVE-2022-23548
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Undergoing Analysis
- Published Version
- 2023-01-05T19:15:09
- Last Modified Date
- 2023-01-18T20:34:34
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:* | 1 | OR | 2.8.14 | |
cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:*:*:*:* | 1 | OR |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-23548 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23548 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-05 19:15:59 | Added to TrackCVE | |||
2023-01-05 19:15:59 | Weakness Enumeration | new | ||
2023-01-05 21:16:41 | 2023-01-05T20:43:47 | CVE Modified Date | updated | |
2023-01-05 21:16:41 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-10 17:18:10 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-12 05:16:01 | 2023-01-12T02:16:34 | CVE Modified Date | updated | |
2023-01-12 05:16:01 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-12 05:16:08 | Weakness Enumeration | update | ||
2023-01-12 05:16:11 | CPE Information | updated | ||
2023-01-17 21:14:24 | 2023-01-17T20:15:11 | CVE Modified Date | updated | |
2023-01-17 21:14:24 | Analyzed | Modified | Vulnerability Status | updated |
2023-01-17 21:14:24 | Weakness Enumeration | update | ||
2023-01-17 21:14:25 | Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, parsing posts can be susceptible to XSS attacks. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds. | Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, parsing posts can be susceptible to regular expression denial of service (ReDoS) attacks. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds. | Description | updated |
2023-01-18 15:15:17 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-01-18 21:13:36 | 2023-01-18T20:34:34 | CVE Modified Date | updated |