Описание
Etherpad is a real-time collaborative editor. In versions prior to 1.8.16, an attacker can craft an *.etherpad file that, when imported, might allow the attacker to gain admin privileges for the Etherpad instance. This, in turn, can be used to install a malicious Etherpad plugin that can execute arbitrary code (including system commands). To gain privileges, the attacker must be able to trigger deletion of express-session state or wait for old express-session state to be cleaned up. Core Etherpad does not delete any express-session state, so the only known attacks require either a plugin that can delete session state or a custom cleanup process (such as a cron job that deletes old sessionstorage:* records). The problem has been fixed in version 1.8.16. If users cannot upgrade to 1.8.16 or install patches manually, several workarounds are available. Users may configure their reverse proxies to reject requests to /p/*/import, which will block all imports, not just `*.etherpad
Ссылки
- PatchThird Party Advisory
- Issue TrackingThird Party Advisory
- Release NotesThird Party Advisory
- MitigationPatchThird Party Advisory
- PatchThird Party Advisory
- Issue TrackingThird Party Advisory
- Release NotesThird Party Advisory
- MitigationPatchThird Party Advisory
Уязвимые конфигурации
EPSS
9.9 Critical
CVSS3
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
Связанные уязвимости
Etherpad is a real-time collaborative editor. In versions prior to 1.8 ...
EPSS
9.9 Critical
CVSS3
8.8 High
CVSS3
9 Critical
CVSS2