Vulnerability Description
Discourse is an open source platform for community discussion. In affected versions by creating replacement words with an almost unlimited number of characters, a moderator can reduce the availability of a Discourse instance. This issue has been addressed in stable version 3.2.3 and in current betas. Users are advised to upgrade. Users unable to upgrade may manually remove the long watched words either via SQL or Rails console.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | < 3.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/7b53e610c17e38be982dffefa4e5b5a709Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-68pm-hm8x-pq2pVendor Advisory
- https://github.com/discourse/discourse/commit/7b53e610c17e38be982dffefa4e5b5a709Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-68pm-hm8x-pq2pVendor Advisory
FAQ
What is CVE-2024-38360?
CVE-2024-38360 is a vulnerability with a CVSS score of 4.9 (MEDIUM). Discourse is an open source platform for community discussion. In affected versions by creating replacement words with an almost unlimited number of characters, a moderator can reduce the availability...
How severe is CVE-2024-38360?
CVE-2024-38360 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-38360?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.