Moderate severityNVD Advisory· Published Aug 15, 2023· Updated Oct 2, 2024
Arbitrary file read via symlinks in Ghost
CVE-2023-40028
Description
Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's content/ folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ghostnpm | < 5.59.1 | 5.59.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-9c9v-w225-v5rgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-40028ghsaADVISORY
- github.com/TryGhost/Ghost/commit/690fbf3f7302ff3f77159c0795928bdd20f41205ghsax_refsource_MISCWEB
- github.com/TryGhost/Ghost/security/advisories/GHSA-9c9v-w225-v5rgghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.