2025-02-16 03:03:51 +00:00

64 lines
3.1 KiB
JSON

{
"id": "CVE-2024-53851",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-04T22:15:40.490",
"lastModified": "2025-02-04T22:15:40.490",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Discourse is an open source platform for community discussion. In affected versions the endpoint for generating inline oneboxes for URLs wasn't enforcing limits on the number of URLs that it accepted, allowing a malicious user to inflict denial of service on some parts of the app. This vulnerability is only exploitable by authenticated users. This issue has been patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. Users unable to upgrade should turn off the `enable inline onebox on all domains` site setting and remove all entries from the `allowed inline onebox domains` site setting."
},
{
"lang": "es",
"value": "Discourse es una plataforma de c\u00f3digo abierto para debates comunitarios. En las versiones afectadas, el endpoint para generar casillas de verificaci\u00f3n en l\u00ednea para URL no impon\u00eda l\u00edmites en la cantidad de URL que aceptaba, lo que permit\u00eda a un usuario malintencionado infligir una denegaci\u00f3n de servicio en algunas partes de la aplicaci\u00f3n. Esta vulnerabilidad solo la pueden explotar los usuarios autenticados. Este problema se ha corregido en las \u00faltimas versiones estables, beta y de pruebas aprobadas de Discourse. Se recomienda a los usuarios que actualicen la versi\u00f3n. Los usuarios que no puedan actualizar la versi\u00f3n deben desactivar la configuraci\u00f3n del sitio `habilitar casillas de verificaci\u00f3n en l\u00ednea en todos los dominios` y eliminar todas las entradas de la configuraci\u00f3n del sitio `dominios de casillas de verificaci\u00f3n en l\u00ednea permitidos`."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://github.com/discourse/discourse/commit/416ec83ae57924d721e6e374f4cda78bd77a4599",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-49rv-574x-wgpc",
"source": "security-advisories@github.com"
}
]
}