Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-r97q-ghch-82j9: Ghost vulnerable to information disclosure of private API fields

Impact

Due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack.

Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added.

Self-hosters are impacted if running Ghost a version below v5.46.1. Immediate action should be taken to secure your site - see patches and workarounds below.

Patches

v5.46.1 contains a fix for this issue.

Workarounds

Add a block for requests to /ghost/api/content/* where the filter query parameter contains password or email.

For more information

If you have any questions or comments about this advisory:

ghsa
#git

Impact

Due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack.

Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added.

Self-hosters are impacted if running Ghost a version below v5.46.1. Immediate action should be taken to secure your site - see patches and workarounds below.

Patches

v5.46.1 contains a fix for this issue.

Workarounds

Add a block for requests to /ghost/api/content/* where the filter query parameter contains password or email.

For more information

If you have any questions or comments about this advisory:

References

  • GHSA-r97q-ghch-82j9
  • TryGhost/Ghost@b3caf16
  • https://github.com/TryGhost/Ghost/releases/tag/v5.46.1

Related news

CVE-2023-31133: Release 5.46.1 · TryGhost/Ghost

Ghost is an app for new-media creators with tools to build a website, publish content, send newsletters, and offer paid subscriptions to members. Prior to version 5.46.1, due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack. Ghost(Pro) has already been patched. Maintainers can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version below v5.46.1. v5.46.1 contains a fix for this issue. As a workaround, add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`.