CVE-2024-35227

Source
https://cve.org/CVERecord?id=CVE-2024-35227
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35227.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35227
Aliases
Published
2024-07-03T17:39:38.293Z
Modified
2026-02-13T00:42:33.990168Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Discourse vulnerable to DoS through Onebox
Details

Discourse is an open-source discussion platform. Prior to version 3.2.3 on the stable branch and version 3.3.0.beta3 on the tests-passed branch, Oneboxing against a carefully crafted malicious URL can reduce the availability of a Discourse instance. The problem has been patched in version 3.2.3 on the stable branch and version 3.3.0.beta3 on the tests-passed branch. There are no known workarounds available for this vulnerability.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35227.json",
    "cwe_ids": [
        "CWE-20"
    ]
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35227.json"