
Cloud Vulnerability DB
A community-led vulnerabilities database
Discourse, an open-source discussion platform, was found to contain a vulnerability (CVE-2023-38706) where malicious users could create unlimited drafts with very long draft keys, potentially exhausting server resources. This vulnerability affected versions prior to 3.1.1 of the 'stable' branch and version 3.2.0.beta1 of the 'beta' and 'tests-passed' branches (GitHub Advisory, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (MEDIUM), with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The attack vector is network-based, with low attack complexity, requiring low privileges and no user interaction. The scope is unchanged, with no impact on confidentiality or integrity, but high impact on availability (NVD).
The primary impact of this vulnerability is on system availability. By creating an unlimited number of drafts with very long draft keys, an attacker could potentially exhaust server resources, leading to a denial of service condition (GitHub Advisory).
The vulnerability has been patched in version 3.1.1 of the 'stable' branch and version 3.2.0.beta1 of the 'beta' and 'tests-passed' branches. There are no known workarounds for this vulnerability, making it essential to upgrade to a patched version (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."