We found results for “”
WS-2020-0399
Good to know:
Date: June 2, 2020
In Ghost headless CMS, versions 1.24.3 through 2.38.1 and 3.0.0 through 3.17.1 are vulnerable to Server-Side Request Forgery in the OEmbed API. An attacker with a publisher role (editor, author, contributor, administrator) in a blog may be able to leverage this to make arbitrary GET requests in a Ghost Blog instance to internal or external networks.
Language: JS
Severity Score
Severity Score
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
CWE-918Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |