Описание
Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.
Ссылки
- Exploit
- Product
- Product
- Exploit
- Product
- Product
Уязвимые конфигурации
Конфигурация 1Версия до 5.85.1 (включая)
cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 71%
0.0069
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-1390
Связанные уязвимости
CVSS3: 9.1
debian
больше 1 года назад
Ghost through 5.85.1 allows remote attackers to bypass an authenticati ...
CVSS3: 9.1
github
больше 1 года назад
Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.
EPSS
Процентиль: 71%
0.0069
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-1390