Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Cache poisoning via maliciously-formed request in Discourse
Vulnerability Description
Discourse is the an open source discussion platform. In affected versions a maliciously crafted request for static assets could cause error responses to be cached by Discourse's default NGINX proxy configuration. A corrected NGINX configuration is included in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Vulnerability Type
不恰当的资源关闭或释放
Vulnerability Title
Discourse 安全漏洞
Vulnerability Description
Discourse是一套开源的社区讨论平台。该平台包括社区、电子邮件和聊天室等功能。 Discourse stable 2.8.6及之前版本、Discourse beta 2.9.0.beta7及之前版本、Discourse tests-passed 2.9.0.beta7及之前版本存在安全漏洞,该漏洞源于恶意制作的静态资产请求可能会导致错误响应,被 Discourse 的默认 NGINX 代理配置缓存。
CVSS Information
N/A
Vulnerability Type
N/A