node/utils/ExportEtherpad.js in Etherpad 1.5.x before 1.5.2 might allow remote attackers to obtain sensitive information by leveraging an improper substring check when exporting a padID.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2015/03/15/3 | Issue Tracking Mailing List Third Party Advisory |
https://github.com/ether/etherpad-lite/commit/a0fb65205c7d7ff95f00eb9fd88e93b300f30c3d | Patch |
https://github.com/ether/etherpad-lite/releases/tag/1.5.2 | Patch Release Notes |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-01-12 17:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-2298
Mitre link : CVE-2015-2298
CVE.ORG link : CVE-2015-2298
JSON object : View
Products Affected
etherpad
- etherpad
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor