CSV Injection, the vulnerability that get pass by and my GhostCMS's CVE
During research on the Ghost CMS application, I identify a CSV Injection in GhostCMS that trigger when unauthenticated threat actor register.
The report can be found here:
Vendor: Ghost Foundation Product: Ghost CMS
What is Ghost CMS?
Ghost CMS is a modern, open-source content management system designed for professional publishing. The Ghost CMS Docker image has over 100 million downloads, and is actively used by Apple, Mozilla, OpenAI, and other major brands.
Damage:
GhostCMS play a very good security strategy, by not allowing users to have any permission/features. No login, no profiles, no images. Only people that allow to access some features are admin, staffs which are consider "trusted members" or "non threat actors" according to them. "Sharp knife can harm both end", it's too secure that help staffs/admin focus on writing and ignore security factors. But when it happen from a non "trusted members", the ignorant may costly. For example in this situation, maliciously crafted formulas can be used for three key attacks:
Why CSV injection is easy to ignore