Vulnerabilities > CVE-2023-44388 - Unspecified vulnerability in Discourse
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
Discourse is an open source platform for community discussion. A malicious request can cause production log files to quickly fill up and thus result in the server running out of disk space. This problem has been patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. It is possible to temporarily work around this problem by reducing the `client_max_body_size nginx directive`. `client_max_body_size` will limit the size of uploads that can be uploaded directly to the server.
Vulnerable Configurations
References
- http://nginx.org/en/docs/http/ngx_http_core_module.html#client_max_body_size
- http://nginx.org/en/docs/http/ngx_http_core_module.html#client_max_body_size
- https://github.com/discourse/discourse/security/advisories/GHSA-89h3-g746-xmwq
- https://github.com/discourse/discourse/security/advisories/GHSA-89h3-g746-xmwq