logo

CVE-2023-40028 ghost

Package

Manager: npm
Name: ghost
Vulnerable Version: >=0 <5.59.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.75814 pctl0.98867

Details

Ghost vulnerable to arbitrary file read via symlinks in content import ### Impact A vulnerability in Ghost allows authenticated users to upload files which are symlinks. This can be exploited to perform an arbitrary file read of any file on the operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder ### Vulnerable versions This security vulnerability is present in Ghost ≤ v5.59.0. ### Patches v5.59.1 contains a fix for this issue. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)

Metadata

Created: 2023-08-15T20:35:20Z
Modified: 2023-08-23T17:19:50Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-9c9v-w225-v5rg/GHSA-9c9v-w225-v5rg.json
CWE IDs: ["CWE-22", "CWE-59"]
Alternative ID: GHSA-9c9v-w225-v5rg
Finding: F063
Auto approve: 1