Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to execute arbitrary code on the server. The instance has to be configured to use a document database (DirtyDB, CouchDB, MongoDB, or RethinkDB).
References
Link | Resource |
---|---|
http://blog.etherpad.org/2018/04/07/important-release-1-6-4/ | Vendor Advisory |
http://blog.etherpad.org/2018/04/07/important-release-1-6-4/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.etherpad.org/2018/04/07/important-release-1-6-4/ - Vendor Advisory |
Information
Published : 2018-04-07 21:29
Updated : 2024-11-21 04:15
NVD link : CVE-2018-9327
Mitre link : CVE-2018-9327
CVE.ORG link : CVE-2018-9327
JSON object : View
Products Affected
etherpad
- etherpad
CWE
CWE-20
Improper Input Validation