Insecure Default Variable Initialization
CVE-2022-47197
Summary
An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost. Default installations of Ghost allow non-administrator users to inject arbitrary JavaScript in posts, which allows privilege escalation to the administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject JavaScript into a post to trick an administrator into visiting the post. A stored XSS vulnerability exists in the "codeinjection_foot" for a post. Note: The vendor still doesn't see the issue as a security issue.
- LOW
- NETWORK
- LOW
- CHANGED
- REQUIRED
- LOW
- LOW
- NONE
CWE-453 - Insecure Default Variable Initialization
The software, by default, initializes an internal variable with an insecure or less secure value than is possible.
References
Advisory Timeline
- Published