Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and version 3.1.0.beta2 on the `beta` and `tests-passed` branches, a malicious user can cause a regular expression denial of service using a carefully crafted user agent. This issue is patched in version 3.0.1 on the `stable` branch and version 3.1.0.beta2 on the `beta` and `tests-passed` branches. There are no known workarounds.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-mrfp-54hf-jrcv | third party advisory |
https://github.com/discourse/discourse/pull/20002 | issue tracking patch |
https://github.com/discourse/discourse/commit/6d92c3cbdac431db99a450f360a3048bb3aaf458 | patch |