CVE-2024-34448: Ghost allows CSV Injection during member CSV export
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33486%
CWE
Published
5/22/2024
Updated
5/22/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @tryghost/members-csv | npm | < 5.82.0 | 5.82.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing CSV formula escaping in the CSV export functionality. The patch explicitly adds 'escapeFormulae: true' to papaparse.unparse options in ghost/members-csv/lib/unparse.js, and the tests demonstrate injection scenarios with fields starting with '='. The vulnerable versions lacked this escaping mechanism, making the unparse() function the injection vector. The function's direct involvement in CSV generation and the specific security-focused patch confirm its role in the vulnerability.