CVE-2021-41163
20.10.2021, 23:15
Discourse is an open source platform for community discussion. In affected versions maliciously crafted requests could lead to remote code execution. This resulted from a lack of validation in subscribe_url values. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. To workaround the issue without updating, requests with a path starting /webhooks/aws path could be blocked at an upstream proxy.
Vendor | Product | Version |
---|---|---|
discourse | discourse | 𝑥 < 2.7.9 |
discourse | discourse | 2.8.0:beta1 |
discourse | discourse | 2.8.0:beta2 |
discourse | discourse | 2.8.0:beta3 |
discourse | discourse | 2.8.0:beta4 |
discourse | discourse | 2.8.0:beta5 |
discourse | discourse | 2.8.0:beta6 |
𝑥
= Vulnerable software versions
References