CVE-2024-24827
CVSS V2 None
CVSS V3 None
Description
Discourse is an open source platform for community discussion. Without a rate limit on the POST /uploads endpoint, it makes it easier for an attacker to carry out a DoS attack on the server since creating an upload can be a resource intensive process. Do note that the impact varies from site to site as various site settings like `max_image_size_kb`, `max_attachment_size_kb` and `max_image_megapixels` will determine the amount of resources used when creating an upload. The issue is patched in the latest stable, beta and tests-passed version of Discourse. Users are advised to upgrade. Users unable to upgrade should reduce `max_image_size_kb`, `max_attachment_size_kb` and `max_image_megapixels` as smaller uploads require less resources to process. Alternatively, `client_max_body_size` can be reduced in Nginx to prevent large uploads from reaching the server.
Overview
- CVE ID
- CVE-2024-24827
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-03-15T19:13:43.221Z
- Last Modified Date
- 2024-03-15T19:13:43.221Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-58vw-246g-fjj4 | x_refsource_CONFIRM |
https://github.com/discourse/discourse/commit/003b80e62f97cd8c0114d6b9d3f93c10443e6fae | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-24827 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24827 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 04:05:14 | Added to TrackCVE |