CVE-2024-23724
JavaScript vulnerability analysis and mitigation

Overview

Ghost CMS through version 5.76.0 is affected by a stored Cross-Site Scripting (XSS) vulnerability that enables privilege escalation. The vulnerability allows a contributor-level user to take over any account through malicious SVG profile pictures containing JavaScript code that interacts with the API on localhost port 3001 (Rhino CVE Details, MITRE CVE).

Technical details

The vulnerability exists in the SVG file upload handling mechanism of Ghost CMS, specifically affecting profile picture uploads. An authenticated attacker with contributor privileges can upload a specially crafted SVG file containing malicious JavaScript code. When this profile picture is viewed by the Owner of the tenant, it executes the embedded JavaScript, leading to privilege escalation (Rhino CVE Details).

Impact

The successful exploitation of this vulnerability allows an attacker with contributor-level access to escalate their privileges to Owner status, effectively gaining complete control over the Ghost CMS instance. This enables full tenant and account takeover capabilities (Rhino CVE Details).

Mitigation and workarounds

While the vendor initially did not acknowledge this as a valid attack vector, an unofficial patch has been proposed through a pull request (#19646). The patch implements DOMPurify for SVG file sanitization to prevent XSS attacks during file uploads (Ghost PR).

Community reactions

The vulnerability has been marked as DISPUTED in the CVE database, with the vendor initially not viewing it as a valid attack vector. However, security researchers have emphasized its significance, leading to the development of an unofficial patch to address the security concern (MITRE CVE).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management