
Cloud Vulnerability DB
A community-led vulnerabilities database
Server Side Request Forgery (SSRF) vulnerability exists in Discourse versions 2.3.2 and 2.6 via the email function. The vulnerability allows attackers to exploit the image upload functionality when writing emails in the editor to upload pictures from remote websites (NVD).
The vulnerability has been assigned a CVSS v3.1 Base Score of 5.3 (MEDIUM) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. The issue specifically occurs in the email composition functionality where users can upload images from remote websites. When this feature is used, the application makes a GET request to the specified remote server to fetch the image (GitHub PR).
The vulnerability allows an attacker to make the Discourse server perform unauthorized GET requests to arbitrary URLs, potentially accessing internal resources or services that should not be accessible from external networks. This could lead to information disclosure or access to internal systems (NVD).
The issue has been addressed through a pull request to the Discourse repository. Users should upgrade to a version after 2.6 that includes the security fix (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."