An arbitrary file upload vulnerability in the file upload module of Ghost CMS v4.42.0 allows attackers to execute arbitrary code via a crafted file. NOTE: Vendor states as detailed in Ghost's security documentation, files can only be uploaded and published by trusted users, this is intentional
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
http://ghost.com | product |
https://ghost.org/customers/ | product |
https://github.com/TryGhost/Ghost | third party advisory |
https://trends.builtwith.com/cms/Ghost | product |
https://youtu.be/PncfBetPk2g | third party advisory exploit |
https://ghost.org/docs/security/#privilege-escalation-attacks |