First published: Tue Aug 15 2023(Updated: )
### Impact A vulnerability in Ghost allows authenticated users to upload files which are symlinks. This can be exploited to perform an arbitrary file read of any file on the operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder ### Vulnerable versions This security vulnerability is present in Ghost ≤ v5.59.0. ### Patches v5.59.1 contains a fix for this issue. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/ghost | <5.59.1 | 5.59.1 |
Ghost Ghost Node.js | <5.59.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability allows authenticated users to upload files that are symlinks, leading to an arbitrary file read of any file on the operating system.
You can check for unknown symlinks within your Ghost site.
The severity rating of this vulnerability is medium, with a CVSS score of 6.5.
Update your Ghost installation to version 5.59.1 or higher.
The CWE IDs associated with this vulnerability are CWE-22 and CWE-59.