6.12.0
14 years ago
4 days ago
Known vulnerabilities in the ghost package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
ghost is a publishing platform Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the media inliner component. An attacker can access internal resources by sending crafted requests through the API while authenticated as a staff user. How to fix Server-side Request Forgery (SSRF)? Upgrade | >=5.38.0 <5.130.6>=6.0.0-alpha.1 <6.11.0 |
ghost is a publishing platform Affected versions of this package are vulnerable to Incorrect Authorization via improper handling of authentication for endpoints intended for Staff Session access. An attacker can gain unauthorized access to restricted endpoints by using Staff Tokens associated with Admin or Owner-role users. How to fix Incorrect Authorization? Upgrade | >=5.121.0 <5.130.6>=6.0.0 <6.11.0 |
ghost is a publishing platform Affected versions of this package are vulnerable to Missing Critical Step in Authentication via the 2FA authentication. An attacker can gain unauthorized access to staff accounts by bypassing the email-based two-factor authentication step. How to fix Missing Critical Step in Authentication? Upgrade | >=5.105.0 <5.130.6>=6.0.0 <6.11.0 |
ghost is a publishing platform Affected versions of this package are vulnerable to SQL Injection via the How to fix SQL Injection? Upgrade | >=5.90.0 <5.130.6>=6.0.0 <6.11.0 |
ghost is a publishing platform Affected versions of this package are vulnerable to Access Restriction Bypass that allows contributors to view draft posts of other users via the NOTE: The vendor's position is that this behavior has no security impact. How to fix Access Restriction Bypass? There is no fixed version for | >=0.4.2-rc1 |
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? There is no fixed version for | >=0.0.0 |
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? There is no fixed version for | >=0.0.0 |
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? There is no fixed version for | >=0.0.0 |
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? There is no fixed version for | >=0.0.0 |