Security News > 2022 > December > Two New Security Flaws Reported in Ghost CMS Blogging Software
Cybersecurity researchers have detailed two security flaws in the JavaScript-based blogging platform known as Ghost, one of which could be abused to elevate privileges via specially crafted HTTP requests.
Tracked as CVE-2022-41654, the authentication bypass vulnerability that allows unprivileged users to make unauthorized modifications to newsletter settings.
Cisco Talos, which discovered the shortcoming, said it could enable a member to change the system-wide default newsletter that all users are subscribed to by default.
"This gives unprivileged users the ability to view and change settings they were not intended to have access to," Ghost noted in an advisory published on November 28, 2022.
Per Talos, this flaw could be leveraged by an attacker to enumerate all valid users of Ghost by supplying an email address, which could then be used to narrow down potential targets for a next-stage phishing attack.
The flaws have been addressed in the Ghost managed hosting service, but users who self-host the service and run a version between 4.46.0 and 4.48.7 or any version of v5 up to and including 5.22.6 are required to update to versions 4.48.8 and 5.22.7.
News URL
https://thehackernews.com/2022/12/two-new-security-flaws-reported-in.html
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-12-22 | CVE-2022-41654 | Unspecified vulnerability in Ghost An authentication bypass vulnerability exists in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. | 4.3 |