Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-30606


Discourse is an open source platform for community discussion. In affected versions a user logged as an administrator can call arbitrary methods on the `SiteSetting` class, notably `#clear_cache!` and `#notify_changed!`, which when done on a multisite instance, can affect the entire cluster resulting in a denial of service. Users not running in multisite environments are not affected. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.


Published

2023-04-18T22:15:08.197

Last Modified

2024-11-21T08:00:29.620

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.2 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-732
  • Type: Primary
    CWE-732

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application discourse discourse ≤ 3.0.1 Yes
Application discourse discourse < 3.1.0 Yes
Application discourse discourse 3.1.0 Yes
Application discourse discourse 3.1.0 Yes

References