Etherpad

Etherpad

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.55%
  • Veröffentlicht 09.12.2021 23:15:07
  • Zuletzt bearbeitet 21.11.2024 06:29:49

Etherpad is a real-time collaborative editor. In versions prior to 1.8.16, an attacker can craft an `*.etherpad` file that, when imported, might allow the attacker to gain admin privileges for the Etherpad instance. This, in turn, can be used to inst...

Exploit
  • EPSS 0.44%
  • Veröffentlicht 21.07.2021 18:15:09
  • Zuletzt bearbeitet 21.11.2024 06:11:15

An Argument Injection issue in the plugin management of Etherpad 1.8.13 allows privileged users to execute arbitrary code on the server by installing plugins from an attacker-controlled source.

Exploit
  • EPSS 0.85%
  • Veröffentlicht 19.07.2021 14:15:08
  • Zuletzt bearbeitet 21.11.2024 06:11:15

A Cross-Site Scripting (XSS) issue in the chat component of Etherpad 1.8.13 allows remote attackers to inject arbitrary JavaScript or HTML by importing a crafted pad.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 28.04.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:13:24

In Etherpad < 1.8.3, a specially crafted URI would raise an unhandled exception in the cache mechanism and cause a denial of service (crash the instance).

Exploit
  • EPSS 0.28%
  • Veröffentlicht 28.04.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:13:24

Etherpad < 1.8.3 is affected by a denial of service in the import functionality. Upload of binary file to the import endpoint would crash the instance.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 28.04.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:13:24

Etherpad <1.8.3 stored passwords used by users insecurely in the database and in log files. This affects every database backend supported by Etherpad.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 28.04.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:13:24

Etherpad < 1.8.3 is affected by a missing lock check which could cause a denial of service. Aggressively targeting random pad import endpoints with empty data would flatten all pads due to lack of rate limiting and missing ownership check.

  • EPSS 0.43%
  • Veröffentlicht 13.02.2020 20:15:10
  • Zuletzt bearbeitet 21.11.2024 02:29:07

Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.2 through 1.5.4 allows remote attackers to read arbitrary files with permissions of the user running the service via a .. (dot dot) in the path parameter of HTTP API requests. ...

  • EPSS 0.33%
  • Veröffentlicht 19.10.2019 01:15:10
  • Zuletzt bearbeitet 21.11.2024 04:32:50

templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.

  • EPSS 0.31%
  • Veröffentlicht 07.04.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:20

Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to export all the existing pads of an instance without knowledge of pad names.