First published: Thu Dec 22 2022(Updated: )
A user enumeration vulnerability exists in the login functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send a series of HTTP requests to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ghost Ghost Node.js | =5.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41697 has a medium severity rating as it allows for user enumeration through specially-crafted HTTP requests.
To fix CVE-2022-41697, upgrade to the latest version of Ghost that addresses the user enumeration vulnerability.
CVE-2022-41697 specifically affects Ghost version 5.9.4.
CVE-2022-41697 can lead to the disclosure of sensitive information related to user accounts.
Yes, CVE-2022-41697 can be exploited remotely by sending a series of HTTP requests.