CVE-2023-40028
Summary
| CVE | CVE-2023-40028 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-15 18:15:00 UTC |
| Updated | 2023-08-23 00:04:00 UTC |
| Description | Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability. |
Risk And Classification
Problem Types: CWE-59
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ???? Fixed arbitrary file read via symlinks in content import · TryGhost/Ghost@690fbf3 · GitHub | MISC | github.com | |
| Arbitrary file read via symlinks in content import · Advisory · TryGhost/Ghost · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 994861 NodeJs (Npm) Security Update for ghost (GHSA-9c9v-w225-v5rg)