Security News > 2021 > October > CISA urges admins to patch critical Discourse code execution bug

CISA urges admins to patch critical Discourse code execution bug
2021-10-25 09:20

A critical Discourse remote code execution vulnerability tracked as CVE-2021-41163 was fixed via an urgent update by the developer on Friday.

Discourse is an open-source forum, long-form chat, and mailing list management platform widely deployed on the web, offering excellent usability and integration potential while focusing heavily on social features.

According to official stats, Discourse was used to publish 3.5 million posts viewed by 405 million users in September 2021 alone.

Because of Discourse's widespread use, CISA also published an alert about the flaw, urging forum admins to update to the latest available version or apply the necessary workarounds.

A Shodan search has returned 8,641 Discourse deployments, many of which could still be exposed to RCE exploitation potential.

The researcher who discovered the flaw told BleepingComputer that he reported the problem to the Discourse team immediately, on October 10, 2021.


News URL

https://www.bleepingcomputer.com/news/security/cisa-urges-admins-to-patch-critical-discourse-code-execution-bug/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-10-20 CVE-2021-41163 Injection vulnerability in Discourse
Discourse is an open source platform for community discussion.
network
low complexity
discourse CWE-74
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Discourse 18 12 107 17 4 140