Vulnerability Description
Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ghost | Ghost | <= 5.85.1 |
Related Weaknesses (CWE)
References
- https://docs.google.com/document/d/1iy0X4Vc9xXYoBxFrcW6ATo8GKPV6ivuLVzn6GgEpwqEExploit
- https://ghost.org/docs/faq/proxying-https-infinite-loops/Product
- https://github.com/TryGhost/Ghost/releasesProduct
- https://docs.google.com/document/d/1iy0X4Vc9xXYoBxFrcW6ATo8GKPV6ivuLVzn6GgEpwqEExploit
- https://ghost.org/docs/faq/proxying-https-infinite-loops/Product
- https://github.com/TryGhost/Ghost/releasesProduct
FAQ
What is CVE-2024-34451?
CVE-2024-34451 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is tha...
How severe is CVE-2024-34451?
CVE-2024-34451 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-34451?
Check the references section above for vendor advisories and patch information. Affected products include: Ghost Ghost.