6.5

CVE-2022-23548

Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, parsing posts can be susceptible to regular expression denial of service (ReDoS) attacks. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DiscourseDiscourse Version < 2.8.14
DiscourseDiscourse Version2.9.0 Updatebeta1
DiscourseDiscourse Version2.9.0 Updatebeta10
DiscourseDiscourse Version2.9.0 Updatebeta11
DiscourseDiscourse Version2.9.0 Updatebeta12
DiscourseDiscourse Version2.9.0 Updatebeta13
DiscourseDiscourse Version2.9.0 Updatebeta14
DiscourseDiscourse Version2.9.0 Updatebeta2
DiscourseDiscourse Version2.9.0 Updatebeta3
DiscourseDiscourse Version2.9.0 Updatebeta4
DiscourseDiscourse Version2.9.0 Updatebeta5
DiscourseDiscourse Version2.9.0 Updatebeta6
DiscourseDiscourse Version2.9.0 Updatebeta7
DiscourseDiscourse Version2.9.0 Updatebeta8
DiscourseDiscourse Version3.0.0 Updatebeta15
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.52% 0.662
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
security-advisories@github.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-1333 Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.