Ghost through 5.76.0 allows stored XSS, and resultant privilege escalation in which a contributor can take over any account, via an SVG profile picture that contains JavaScript code to interact with the API on localhost TCP port 3001. NOTE: The discoverer reports that "The vendor does not view this as a valid vector."
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://rhinosecuritylabs.com/blog/ | third party advisory |
https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724 | vendor advisory exploit |
https://github.com/TryGhost/Ghost/pull/19646 | patch |