logo

GHSA-7v28-g2pq-ggg8 ghost

Package

Manager: npm
Name: ghost
Vulnerable Version: >=0 <4.48.2 || >=5.0.0 <5.2.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L

EPSS: N/A pctlN/A

Details

Ghost vulnerable to remote code execution in locale setting change ### Impact A [vulnerability](https://www.cve.org/CVERecord?id=CVE-2022-24785) in an upstream library means an authenticated attacker can abuse locale input to execute arbitrary commands from a file that has previously been uploaded using the file upload functionality in the post editor. ### Patches Fixed in 5.2.3, all 5.x sites should update as soon as possible. Fixed in 4.48.2, all 4.x sites should update as soon as possible. ### Workarounds Patched versions of Ghost add validation to the locale input to prevent execution of arbitrary files. Updating Ghost is the quickest complete solution. As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /ghost/api/admin/settings/` endpoint, which will also disable updating settings for your site. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org) ### Credits * devx00 - https://twitter.com/devx00

Metadata

Created: 2022-06-17T01:16:03Z
Modified: 2022-08-10T22:15:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-7v28-g2pq-ggg8/GHSA-7v28-g2pq-ggg8.json
CWE IDs: []
Alternative ID: N/A
Finding: F184
Auto approve: 1