CVE Vulnerabilities

CVE-2022-39241

Server-Side Request Forgery (SSRF)

Published: Nov 02, 2022 | Modified: Nov 04, 2022
CVSS 3.x
4.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest stable, beta, and test-passed versions are now patched. As a workaround, self-hosters can use DISCOURSE_BLOCKED_IP_BLOCKS env var (which overrides blocked_ip_blocks setting) to stop webhooks from accessing private IPs.

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

Name Vendor Start Version End Version
Discourse Discourse * 2.8.10 (excluding)
Discourse Discourse 2.9.0-beta1 (including) 2.9.0-beta1 (including)
Discourse Discourse 2.9.0-beta10 (including) 2.9.0-beta10 (including)
Discourse Discourse 2.9.0-beta2 (including) 2.9.0-beta2 (including)
Discourse Discourse 2.9.0-beta3 (including) 2.9.0-beta3 (including)
Discourse Discourse 2.9.0-beta4 (including) 2.9.0-beta4 (including)
Discourse Discourse 2.9.0-beta5 (including) 2.9.0-beta5 (including)
Discourse Discourse 2.9.0-beta6 (including) 2.9.0-beta6 (including)
Discourse Discourse 2.9.0-beta7 (including) 2.9.0-beta7 (including)
Discourse Discourse 2.9.0-beta8 (including) 2.9.0-beta8 (including)
Discourse Discourse 2.9.0-beta9 (including) 2.9.0-beta9 (including)

References