Miggo Logo

CVE-2022-28397:
Arbitrary file upload in Ghost

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.86679%
Published
4/13/2022
Updated
4/22/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
ghostnpm<= 4.42.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided information lacks concrete technical details about the implementation of Ghost CMS's file upload module. While the vulnerability (CWE-434) indicates insufficient file type validation, there is no access to:- 1) Specific code snippets from Ghost v4.42.0, 2) GitHub patch/diff information, or 3) File path/function names from vulnerability reports. The vendor's security documentation mentions intentional trusted-user uploads but doesn't reveal implementation details. Without these critical artifacts, we cannot confidently identify specific vulnerable functions. Arbitrary file upload vulnerabilities typically involve file handling functions, but precise identification requires code analysis unavailable in the provided materials.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n *r*itr*ry *il* uplo** vuln*r**ility in t** *il* uplo** mo*ul* o* **ost *MS v*.**.* *llows *tt**k*rs to *x**ut* *r*itr*ry *o** vi* * *r**t** *il*.

Reasoning

T** provi*** in*orm*tion l**ks *on*r*t* t***ni**l **t*ils **out t** impl*m*nt*tion o* **ost *MS's *il* uplo** mo*ul*. W*il* t** vuln*r**ility (*W*-***) in*i**t*s insu**i*i*nt *il* typ* v*li**tion, t**r* is no ****ss to:- *) Sp**i*i* *o** snipp*ts *ro