QID 150689

Date Published: 2023-06-15

QID 150689: Ghost CMS Path Traversal Vulnerability (CVE-2023-32235)

Ghost is a free and open source blogging platform, a headless Node.js CMS designed to simplify the process of online publishing for individual bloggers as well as online publications.

Affected versions of Ghost allows remote attackers to read arbitrary files within the active theme's folder via "/assets/built%2F..%2F..%2F/" directory traversal. This vulnerability occurs in "frontend/web/middleware/static-theme.js".

Affected Products:
Ghost prior to version 5.42.1

QID Detection Logic (Unauthenticated):
This QID sends a HTTP GET request to "assets/built%2F..%2F..%2F/package.jsons" endpoint and based on the response determines if the target application is vulnerable.

Successful exploitation of this vulnerability could allow remote attackers to read sensitive files within the target application.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to upgrade to latest version of Ghost to remediate this vulnerability. For more information please refer GitHub Security Advisory
    Vendor References

    CVEs related to QID 150689

    Software Advisories
    Advisory ID Software Component Link
    GHSA-wf7x-fh6w-34r6 URL Logo github.com/advisories/GHSA-wf7x-fh6w-34r6