{"id":"BIT-discourse-2022-39241","summary":"Possible Server-Side Request Forgery (SSRF) in webhooks","details":"Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest `stable`, `beta`, and `test-passed` versions are now patched. As a workaround, self-hosters can use `DISCOURSE_BLOCKED_IP_BLOCKS` env var (which overrides `blocked_ip_blocks` setting) to stop webhooks from accessing private IPs.","aliases":["CVE-2022-39241","GHSA-rcc5-28r3-23rr"],"modified":"2025-10-08T05:27:16.012295Z","published":"2024-03-06T11:04:00.270Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://github.com/discourse/discourse/security/advisories/GHSA-rcc5-28r3-23rr"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39241"}],"affected":[{"package":{"name":"discourse","ecosystem":"Bitnami","purl":"pkg:bitnami/discourse"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.8.10"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/discourse/BIT-discourse-2022-39241.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}]}],"schema_version":"1.7.3"}