Vulnerability Description
Discourse is an open source discussion platform. In affected versions a malicious user can cause a regular expression denial of service using a carefully crafted git URL. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | < 3.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/ec4c30270887366dc28788bc4ab8a22a09Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-4w55-w26q-r35wVendor Advisory
- https://github.com/discourse/discourse/commit/ec4c30270887366dc28788bc4ab8a22a09Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-4w55-w26q-r35wVendor Advisory
FAQ
What is CVE-2023-25167?
CVE-2023-25167 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Discourse is an open source discussion platform. In affected versions a malicious user can cause a regular expression denial of service using a carefully crafted git URL. This issue is patched in the ...
How severe is CVE-2023-25167?
CVE-2023-25167 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-25167?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.