An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file. NOTE: Vendor states that as outlined in Ghost's security documentation, upload of SVGs is only possible by trusted authenticated users. The uploading of SVG files to Ghost does not represent a remote code execution vulnerability. SVGs are not executable on the server, and may only execute javascript in a client's browser - this is expected and intentional functionality
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fvc6-qjp7-m4g4 Arbitrary file upload in Ghost
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T05:18:39.292Z

Reserved: 2022-03-14T00:00:00

Link: CVE-2022-27139

cve-icon Vulnrichment

Updated: 2024-08-03T05:18:39.292Z

cve-icon NVD

Status : Modified

Published: 2022-04-12T17:15:09.840

Modified: 2024-11-21T06:55:13.503

Link: CVE-2022-27139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses