CVE-2023-40028

Published Aug 15, 2023

Last updated 2 years ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2023-40028 is a vulnerability affecting Ghost, an open-source content management system. Versions prior to 5.59.1 are vulnerable. It allows authenticated users to upload files that are symbolic links (symlinks). This vulnerability can be exploited to perform arbitrary file reads on the host operating system. By uploading a malicious ZIP file containing a symlink, an attacker can gain unauthorized access to sensitive files on the system. To mitigate this, users are advised to upgrade to version 5.59.1 or later. Administrators can also check for exploitation by looking for unknown symlinks within Ghost's `content/` folder.

Description
Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Source
security-advisories@github.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
6.5
Impact score
3.6
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Severity
MEDIUM

Weaknesses

nvd@nist.gov
CWE-59
security-advisories@github.com
CWE-22

Social media

Hype score
Not currently trending

Configurations