GHSA-r97q-ghch-82j9

Suggest an improvement
Source
https://github.com/advisories/GHSA-r97q-ghch-82j9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-r97q-ghch-82j9/GHSA-r97q-ghch-82j9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r97q-ghch-82j9
Aliases
Related
Published
2023-05-03T21:57:10Z
Modified
2023-12-06T01:03:00.405982Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Ghost vulnerable to information disclosure of private API fields
Details

Impact

Due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack.

Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added.

Self-hosters are impacted if running Ghost a version below v5.46.1. Immediate action should be taken to secure your site - see patches and workarounds below.

Patches

v5.46.1 contains a fix for this issue.

Workarounds

Add a block for requests to /ghost/api/content/* where the filter query parameter contains password or email.

For more information

If you have any questions or comments about this advisory:

Database specific
{
    "nvd_published_at": "2023-05-08T21:15:11Z",
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-05-03T21:57:10Z"
}
References

Affected packages

npm / ghost

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.46.1