Description
An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file. NOTE: Vendor states that as outlined in Ghost's security documentation, upload of SVGs is only possible by trusted authenticated users. The uploading of SVG files to Ghost does not represent a remote code execution vulnerability. SVGs are not executable on the server, and may only execute javascript in a client's browser - this is expected and intentional functionality
Remediation
References
http://ghost.org/docs/security/#privilege-escalation-attacks
https://youtu.be/FCqWEvir2wE
Related Vulnerabilities
CVE-2019-10798 Vulnerability in npm package rdf-graph-array
CVE-2018-10469 Vulnerability in maven package org.b3log:symphony
CVE-2020-36048 Vulnerability in maven package org.webjars.npm:engine.io
CVE-2023-26149 Vulnerability in maven package org.webjars.npm:quill-mention
CVE-2021-21363 Vulnerability in maven package io.swagger:swagger-generator