Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2024-23724

Description

Ghost through 5.76.0 allows stored XSS, and resultant privilege escalation in which a contributor can take over any account, via an SVG profile picture that contains JavaScript code to interact with the API on localhost TCP port 3001. NOTE: The discoverer reports that "The vendor does not view this as a valid vector."

POC

Reference

- https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724

Github

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/RhinoSecurityLabs/CVEs

- https://github.com/Youssefdds/CVE-2024-23724

- https://github.com/gl1tch0x1/Ghost-CMS-Exploit

- https://github.com/ibrahmsql/Ghostscan

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/plzheheplztrying/cve_monitor