// For flags

CVE-2023-45806

Discourse vulnerable to DoS via Regexp Injection in Full Name

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, if a user has been quoted and uses a `|` in their full name, they might be able to trigger a bug that generates a lot of duplicate content in all the posts they've been quoted by updating their full name again. Version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches contain a patch for this issue. No known workaround exists, although one can stop the "bleeding" by ensuring users only use alphanumeric characters in their full name field.

Discourse es una plataforma de código abierto para el debate comunitario. Antes de la versión 3.1.3 de la rama `stable` y la versión 3.2.0.beta3 de las ramas `beta` y `tests-passed`, si un usuario ha sido citado y usa un `|` en su nombre completo, podría desencadenar un error que genere una gran cantidad de contenido duplicado en todas las publicaciones que han sido citados al actualizar su nombre completo nuevamente. La versión 3.1.3 de la rama `stable` y la versión 3.2.0.beta3 de las ramas `beta` y `tests-passed` contienen un parche para este problema. No existe ningún workaround conocido, aunque se puede detener el "sangrado" asegurándose de que los usuarios sólo utilicen caracteres alfanuméricos en el campo de nombre completo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-10-13 CVE Reserved
  • 2023-11-10 CVE Published
  • 2024-09-03 CVE Updated
  • 2024-11-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-1333: Inefficient Regular Expression Complexity
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Discourse
Search vendor "Discourse"
Discourse
Search vendor "Discourse" for product "Discourse"
< 3.1.3
Search vendor "Discourse" for product "Discourse" and version " < 3.1.3"
stable
Affected
Discourse
Search vendor "Discourse"
Discourse
Search vendor "Discourse" for product "Discourse"
< 3.2.0
Search vendor "Discourse" for product "Discourse" and version " < 3.2.0"
beta
Affected
Discourse
Search vendor "Discourse"
Discourse
Search vendor "Discourse" for product "Discourse"
3.2.0
Search vendor "Discourse" for product "Discourse" and version "3.2.0"
beta1, beta
Affected
Discourse
Search vendor "Discourse"
Discourse
Search vendor "Discourse" for product "Discourse"
3.2.0
Search vendor "Discourse" for product "Discourse" and version "3.2.0"
beta2, beta
Affected