Headline
CVE-2023-44388: Malicious requests can fill up the log files resulting in a DoS on the server
Discourse is an open source platform for community discussion. A malicious request can cause production log files to quickly fill up and thus result in the server running out of disk space. This problem has been patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. It is possible to temporarily work around this problem by reducing the client_max_body_size nginx directive
. client_max_body_size
will limit the size of uploads that can be uploaded directly to the server.
Package
Discourse (Discourse)
Affected versions
stable <= 3.1.1; beta <= 3.2.0.beta2; tests-passed <= 3.2.0.beta2
Patched versions
stable > 3.1.1; beta > 3.2.0.beta2; tests-passed > 3.2.0.beta2
Impact
A malicious request can cause production log files to quickly fill up and thus result in the server running out of disk space.
Patches
The problem has been patched in the latest version of Discourse.
Workarounds
It is possible to temporarily work around this problem by reducing the client_max_body_size nginx directive. This can be done by adding the following lines to the container definition file:
run:
- replace:
global: true
filename: /etc/nginx/conf.d/discourse.conf
from: /client_max_body_size .*$/
to: client_max_body_size 0.16m;
Note that the client_max_body_size will limit the size of uploads that can be uploaded directly to the server.