Auth attack through Zapier integration

Hi there,

We have a self-hosted Ghost instance (running really well, I like it, thx!) and today I got 45 emails from the Ghost engine, saying that the Zapier integration failed. We don’t have any Zapier integrations set up.

Because of the URL-s the calls tried to reach, I think someone tried to attack the site authentication. (Failed request URL: /resources/ghost/api/canary/admin/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e//etc/passwd)

Have you ever experienced something similar? Is there a way to close the Zapier port/connection?

I just received a similar e-mail - Zapier connection is not enabled or configured in Ghost (and never was!).

What / Who could be triggering this?

These messages aren’t coming from Ghost or Ghost’s own Zapier app/integration so it sounds like it could be phishing attempts.

Would you be able to forward the email you received to kevin@ghost.org?

Thanks for forwarding. I was mistaken, these emails are being sent from Ghost; I’d searched our codebase but didn’t find the related code because it was removed a couple of months ago because the notifications were mostly useless/incorrect.

Looking at the old code, it has a bug where a request to an old versioned Admin API endpoint with no query param and no auth header would trigger the version-mismatch email for the first API key in the database which would always be the Zapier key.

In short, these requests are just the typical type of security-probing requests that every site on the public internet receives constantly. Aside from the incorrectly sent email the request is harmless and just gets a 404 response. Nothing to worry about, and if you upgrade to recent version of Ghost the notifications will go away.

2 Likes

I was going to say, the phisher are getting REALLY good lol.