Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv | third party advisory issue tracking |
https://github.com/discourse/discourse/pull/15927 | third party advisory patch |
https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e | third party advisory patch |