NA

CVE-2023-32235

Published: 05/05/2023 Updated: 11/05/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Ghost prior to 5.42.1 allows remote malicious users to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ghost ghost

Github Repositories

A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder.

Bug Bounty Report - Ghost Path Traversal (CVE-2023-32235) Summary The Ghost application is vulnerable to a path traversal vulnerability, identified as CVE-2023-32235 This vulnerability allows an attacker to access sensitive files outside the intended directory by manipulating the "packagejson" file path Vulnerability Details CVE ID: CVE-2023-32235 Vulnerability Ty