node/utils/ExportEtherpad.js in Etherpad 1.5.x before 1.5.2 might allow remote attackers to obtain sensitive information by leveraging an improper substring check when exporting a padID.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/ether/etherpad-lite/releases/tag/1.5.2 | Patch Release Notes | 
| https://github.com/ether/etherpad-lite/commit/a0fb65205c7d7ff95f00eb9fd88e93b300f30c3d | Patch | 
| http://www.openwall.com/lists/oss-security/2015/03/15/3 | Issue Tracking Mailing List Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2018-01-12 09:29
Updated : 2018-01-29 05:31
NVD link : CVE-2015-2298
Mitre link : CVE-2015-2298
JSON object : View
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
                etherpad
- etherpad
 


