Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown
CVE-2021-43802
Disclosure Date: December 09, 2021 (last updated February 23, 2025)
Etherpad is a real-time collaborative editor. In versions prior to 1.8.16, an attacker can craft an `*.etherpad` file that, when imported, might allow the attacker to gain admin privileges for the Etherpad instance. This, in turn, can be used to install a malicious Etherpad plugin that can execute arbitrary code (including system commands). To gain privileges, the attacker must be able to trigger deletion of `express-session` state or wait for old `express-session` state to be cleaned up. Core Etherpad does not delete any `express-session` state, so the only known attacks require either a plugin that can delete session state or a custom cleanup process (such as a cron job that deletes old `sessionstorage:*` records). The problem has been fixed in version 1.8.16. If users cannot upgrade to 1.8.16 or install patches manually, several workarounds are available. Users may configure their reverse proxies to reject requests to `/p/*/import`, which will block all imports, not just `*.etherpa…
0
Attacker Value
Unknown
CVE-2021-34816
Disclosure Date: July 21, 2021 (last updated February 23, 2025)
An Argument Injection issue in the plugin management of Etherpad 1.8.13 allows privileged users to execute arbitrary code on the server by installing plugins from an attacker-controlled source.
0
Attacker Value
Unknown
CVE-2021-34817
Disclosure Date: July 19, 2021 (last updated February 23, 2025)
A Cross-Site Scripting (XSS) issue in the chat component of Etherpad 1.8.13 allows remote attackers to inject arbitrary JavaScript or HTML by importing a crafted pad.
0
Attacker Value
Unknown
CVE-2020-22782
Disclosure Date: April 28, 2021 (last updated November 28, 2024)
Etherpad < 1.8.3 is affected by a denial of service in the import functionality. Upload of binary file to the import endpoint would crash the instance.
0
Attacker Value
Unknown
CVE-2020-22785
Disclosure Date: April 28, 2021 (last updated February 22, 2025)
Etherpad < 1.8.3 is affected by a missing lock check which could cause a denial of service. Aggressively targeting random pad import endpoints with empty data would flatten all pads due to lack of rate limiting and missing ownership check.
0
Attacker Value
Unknown
CVE-2020-22781
Disclosure Date: April 28, 2021 (last updated February 22, 2025)
In Etherpad < 1.8.3, a specially crafted URI would raise an unhandled exception in the cache mechanism and cause a denial of service (crash the instance).
0
Attacker Value
Unknown
CVE-2020-22783
Disclosure Date: April 28, 2021 (last updated February 22, 2025)
Etherpad <1.8.3 stored passwords used by users insecurely in the database and in log files. This affects every database backend supported by Etherpad.
0
Attacker Value
Unknown
CVE-2015-3309
Disclosure Date: February 13, 2020 (last updated February 21, 2025)
Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.2 through 1.5.4 allows remote attackers to read arbitrary files with permissions of the user running the service via a .. (dot dot) in the path parameter of HTTP API requests. NOTE: This vulnerability is due to an incomplete fix to CVE-2015-3297.
0
Attacker Value
Unknown
CVE-2019-18209
Disclosure Date: October 19, 2019 (last updated November 27, 2024)
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
0
Attacker Value
Unknown
CVE-2018-9845
Disclosure Date: April 29, 2018 (last updated November 26, 2024)
Etherpad Lite before 1.6.4 is exploitable for admin access.
0