Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.
References
Configurations
History
20 Jun 2025, 18:06
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ghost
Ghost ghost |
|
References | () https://docs.google.com/document/d/1iy0X4Vc9xXYoBxFrcW6ATo8GKPV6ivuLVzn6GgEpwqE - Exploit | |
References | () https://ghost.org/docs/faq/proxying-https-infinite-loops/ - Product | |
References | () https://github.com/TryGhost/Ghost/releases - Product | |
CPE | cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:* |
Information
Published : 2024-06-16 22:15
Updated : 2025-06-20 18:06
NVD link : CVE-2024-34451
Mitre link : CVE-2024-34451
CVE.ORG link : CVE-2024-34451
JSON object : View
Products Affected
ghost
- ghost
CWE
CWE-1390
Weak Authentication