{"id":"CVE-2020-8134","details":"Server-side request forgery (SSRF) vulnerability in Ghost CMS \u003c 3.10.0 allows an attacker to scan local or external network or otherwise interact with internal systems.","aliases":["BIT-ghost-2020-8134","GHSA-q4h8-7qff-gh6c"],"modified":"2026-04-09T07:20:11.956765Z","published":"2020-03-20T19:15:12.797Z","references":[{"type":"FIX","url":"https://hackerone.com/reports/793704"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tryghost/ghost","events":[{"introduced":"0"},{"fixed":"52ccd4648f49c88137e949b45cc14aa91ace3d1b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.10.0"}]}}],"versions":["0.10.0","0.10.1","0.11.0","0.2.0","0.2.0-final","0.2.1","0.3.0","0.4.0","0.4.0-pre","0.4.0-pre2","0.4.0-pre3","0.4.2","0.4.2-rc1","0.4.2-rc2","0.5.0","0.5.0-rc1","0.5.0-rc2","0.5.0-rc3","0.5.0-rc4","0.5.10","0.5.2","0.5.2-rc1","0.5.2-rc2","0.5.3","0.5.4","0.5.5","0.5.6","0.5.7","0.5.8","0.5.9","0.6.0","0.6.1","0.6.2","0.6.3","0.6.4","0.7.0","0.7.1","0.7.2","0.7.3","0.7.4","0.7.5","0.7.6","0.7.7","0.7.8","0.7.9","0.8.0","0.9.0","0.9.0-beta.1","0.9.0-beta.2","1.0.0","1.0.0-alpha.1","1.0.0-alpha.10","1.0.0-alpha.11","1.0.0-alpha.13","1.0.0-alpha.14","1.0.0-alpha.15","1.0.0-alpha.16","1.0.0-alpha.17","1.0.0-alpha.18","1.0.0-alpha.19","1.0.0-alpha.2","1.0.0-alpha.20","1.0.0-alpha.21","1.0.0-alpha.3","1.0.0-alpha.4","1.0.0-alpha.5","1.0.0-alpha.6","1.0.0-alpha.7","1.0.0-alpha.8","1.0.0-alpha.9","1.0.0-beta.1","1.0.0-beta.2","1.0.0-rc.1","1.0.1","1.0.2","1.1.0","1.10.0","1.11.0","1.11.1","1.12.0","1.12.1","1.13.0","1.14.0","1.14.1","1.15.0","1.15.1","1.16.0","1.16.1","1.16.2","1.17.0","1.17.1","1.17.2","1.17.3","1.18.0","1.18.1","1.18.2","1.18.3","1.18.4","1.19.0","1.19.1","1.19.2","1.2.0","1.20.0","1.20.1","1.20.2","1.20.3","1.21.0","1.21.1","1.21.2","1.21.3","1.21.4","1.21.5","1.21.6","1.21.7","1.22.0","1.22.1","1.22.2","1.22.3","1.22.4","1.22.5","1.22.6","1.22.7","1.22.8","1.23.0","1.23.1","1.24.0","1.24.1","1.24.2","1.24.3","1.24.4","1.24.5","1.24.6","1.24.7","1.24.8","1.24.9","1.25.0","1.25.1","1.25.2","1.25.3","1.25.4","1.25.5","1.3.0","1.4.0","1.5.0","1.5.1","1.5.2","1.6.0","1.6.1","1.6.2","1.7.0","1.7.1","1.8.0","1.8.1","1.8.2","1.8.3","1.8.4","1.8.5","1.8.6","1.8.7","1.9.0","1.9.1","2.0.0","2.0.1","2.0.2","2.0.3","2.1.0","2.1.1","2.1.2","2.1.3","2.1.4","2.10.0","2.10.1","2.10.2","2.11.0","2.11.1","2.12.0","2.13.0","2.13.1","2.13.2","2.14.0","2.14.1","2.14.2","2.14.3","2.15.0","2.16.0","2.16.1","2.16.2","2.16.3","2.16.4","2.17.0","2.17.1","2.17.2","2.18.0","2.18.1","2.18.2","2.18.3","2.19.0","2.19.1","2.19.2","2.19.3","2.19.4","2.2.0","2.2.1","2.2.2","2.2.3","2.2.4","2.20.0","2.20.1","2.21.0","2.21.1","2.22.0","2.22.1","2.22.2","2.22.3","2.23.0","2.23.1","2.23.2","2.23.3","2.23.4","2.24.0","2.25.0","2.25.1","2.25.2","2.25.3","2.25.4","2.25.5","2.25.6","2.25.7","2.25.8","2.25.9","2.26.0","2.27.0","2.28.0","2.28.1","2.29.0","2.29.1","2.3.0","2.30.0","2.30.1","2.30.2","2.31.0","2.31.1","2.32.0","2.33.0","2.34.0","2.35.0","2.36.0","2.37.0","2.4.0","2.5.0","2.6.0","2.6.1","2.6.2","2.7.0","2.7.1","2.8.0","2.9.0","2.9.1","3.0.0","3.0.1","3.0.2","3.0.3","3.1.0","3.1.1","3.2.0","3.3.0","3.4.0","3.5.0","3.5.1","3.5.2","3.6.0","3.7.0","3.8.0","3.9.0","backbone-admin","fancyFirstChar"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8134.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}]}