node/utils/ExportEtherpad.js in Etherpad 1.5.x before 1.5.2 might allow remote attackers to obtain sensitive information by leveraging an improper substring check when exporting a padID.
References
Link | Resource |
---|---|
https://github.com/ether/etherpad-lite/releases/tag/1.5.2 | Patch Release Notes |
https://github.com/ether/etherpad-lite/commit/a0fb65205c7d7ff95f00eb9fd88e93b300f30c3d | Patch |
http://www.openwall.com/lists/oss-security/2015/03/15/3 | Issue Tracking Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-01-12 09:29
Updated : 2018-01-29 05:31
NVD link : CVE-2015-2298
Mitre link : CVE-2015-2298
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
etherpad
- etherpad