Discourse Calendar plugin: Region length overflow allows DoS bandwidth & disk
CVE-2024-21658 Published on August 30, 2024
Insufficient control of region value length in discourse-calendar
discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible.
Vulnerability Analysis
CVE-2024-21658 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a small impact on availability.
Weakness Type
What is a Resource Exhaustion Vulnerability?
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CVE-2024-21658 has been classified to as a Resource Exhaustion vulnerability or weakness.
Products Associated with CVE-2024-21658
stack.watch emails you whenever new vulnerabilities are published in Discourse Calendar or Discourse. Just hit a watch button to start following.
Affected Versions
discourse-calendar Version < 66259cd21dc6a1b2139d9833f3f847d8013e6759 is affected by CVE-2024-21658Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.