Path Traversal in Ghost
High severity
GitHub Reviewed
Published
May 5, 2023
to the GitHub Advisory Database
•
Updated Nov 10, 2023
Description
Published by the National Vulnerability Database
May 5, 2023
Published to the GitHub Advisory Database
May 5, 2023
Reviewed
May 5, 2023
Last updated
Nov 10, 2023
Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
References