2024-11-23 15:12:23 +00:00

129 lines
4.2 KiB
JSON

{
"id": "CVE-2022-27139",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-12T17:15:09.840",
"lastModified": "2024-11-21T06:55:13.503",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file. NOTE: Vendor states that as outlined in Ghost's security documentation, upload of SVGs is only possible by trusted authenticated users. The uploading of SVG files to Ghost does not represent a remote code execution vulnerability. SVGs are not executable on the server, and may only execute javascript in a client's browser - this is expected and intentional functionality"
},
{
"lang": "es",
"value": "** EN DISPUTA ** Una vulnerabilidad de carga de archivos arbitraria en el m\u00f3dulo de carga de archivos de Ghost versi\u00f3n v4.39.0, permite a atacantes ejecutar c\u00f3digo arbitrario por medio de un archivo SVG dise\u00f1ado. NOTA: El proveedor afirma que, tal y como se indica en la documentaci\u00f3n de seguridad de Ghost, la carga de SVG s\u00f3lo es posible por parte de usuarios autentificados de confianza. La carga de archivos SVG en Ghost no representa una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Los SVG no son ejecutables en el servidor, y s\u00f3lo pueden ejecutar javascript en el navegador de un cliente; se trata de una funcionalidad esperada e intencionada"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ghost:ghost:4.39.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "385A2C69-1F04-4162-BBFB-2FA2704DFC3E"
}
]
}
]
}
],
"references": [
{
"url": "http://ghost.org/docs/security/#privilege-escalation-attacks",
"source": "cve@mitre.org"
},
{
"url": "https://youtu.be/FCqWEvir2wE",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://ghost.org/docs/security/#privilege-escalation-attacks",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://youtu.be/FCqWEvir2wE",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}