Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest `stable`, `beta`, and `test-passed` versions are now patched. As a workaround, self-hosters can use `DISCOURSE_BLOCKED_IP_BLOCKS` env var (which overrides `blocked_ip_blocks` setting) to stop webhooks from accessing private IPs.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T12:00:43.541Z
Reserved: 2022-09-02T00:00:00
Link: CVE-2022-39241

No data.

Status : Modified
Published: 2022-11-02T17:15:17.187
Modified: 2024-11-21T07:17:51.443
Link: CVE-2022-39241

No data.