Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-29484
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-29 Apr, 2021 | 21:15
Updated At-14 Sep, 2021 | 18:47

Ghost is a Node.js CMS. An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site. The issue has been fixed in 4.3.3, all 4.x sites should upgrade as soon as possible. As the endpoint is unused, the patch simply removes it. As a workaround blocking access to /ghost/preview can also mitigate the issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.8MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

ghost
ghost
>>ghost>>Versions from 4.0.0(inclusive) to 4.3.3(exclusive)
cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE-79Secondarysecurity-advisories@github.com
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-79
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.sonarsource.com/ghost-admin-takeoversecurity-advisories@github.com
Exploit
Third Party Advisory
https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290security-advisories@github.com
Vendor Advisory
https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrgsecurity-advisories@github.com
Mitigation
Third Party Advisory
https://www.npmjs.com/package/ghostsecurity-advisories@github.com
Product
Third Party Advisory
Hyperlink: https://blog.sonarsource.com/ghost-admin-takeover
Source: security-advisories@github.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290
Source: security-advisories@github.com
Resource:
Vendor Advisory
Hyperlink: https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg
Source: security-advisories@github.com
Resource:
Mitigation
Third Party Advisory
Hyperlink: https://www.npmjs.com/package/ghost
Source: security-advisories@github.com
Resource:
Product
Third Party Advisory
Change History
0Changes found

Details not found