{ "id": "CVE-2015-3297", "sourceIdentifier": "cve@mitre.org", "published": "2017-07-07T16:29:00.173", "lastModified": "2017-07-14T13:16:06.657", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.1 through 1.5.2 allows remote attackers to read arbitrary files by leveraging replacement of backslashes with slashes in the path parameter of HTTP API requests." }, { "lang": "es", "value": "Una vulnerabilidad de salto de directorio en node/utils/Minify.js en Etherpad desde la versi\u00f3n 1.1.1 hasta la 1.5.2 permite que atacantes remotos lean archivos arbitrarios aprovechando el reemplazo de barras diagonales inversas por barras diagonales en el par\u00e1metro path de peticiones API HTTP." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2E21B176-6B0C-4EC9-AC85-814CCD7B02AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6A021FEF-DBC8-455A-945A-96CE411091C0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CBB9277-A9C7-4979-8CD6-5DAF20B21022" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B5085F7-7BF6-4C34-9D2D-2738A49B21D9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "643BCCDE-77EF-4551-8CAD-390C4AB0289E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "41A2C651-7345-4354-B112-21DBCD176BF9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DC65D6-8950-4EF2-880E-2916AAB2B544" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "810D72F9-71E7-47A8-9496-7EF0F7F96BAF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4F28C6F-31ED-4A86-A8CB-A7F3FE80463D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "554B75F7-6CF0-47AD-AB49-1519DC5E5FC1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "47725F83-A7FB-47AC-9868-EEC0D9BE7F85" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "856989B3-F1CA-4CE3-8B0D-BF1D040FF407" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "00362C25-0438-4928-866C-7BE99C569987" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "272184D3-C079-4D69-9C99-B9C22576DD15" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "3ECA2014-464B-4140-9B22-9704DB16274B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FA27831F-08D4-488A-922F-D0FA210A9882" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "6C5829CF-4DBB-44CD-B989-F5D3A4EC6D9E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "5629C43A-9910-45EA-A43F-C7CA22FC4434" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.81:*:*:*:*:*:*:*", "matchCriteriaId": "9865B41A-F7BA-4281-AE08-5E9D821C5310" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.2.91:*:*:*:*:*:*:*", "matchCriteriaId": "4CD2B7A2-34F9-48EB-90E5-93C8D2167D75" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2C42AC6-B0C9-4468-BD0D-589916E29AAB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "08B94664-ED9A-4459-B84E-9D552A6C4EEF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDD7903B-96A0-4022-ADD8-306155E4595B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB82785A-1099-4730-9782-803F0577EFDE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB1BC2A6-1B10-457A-AC41-F500CABF8C41" }, { "vulnerable": true, "criteria": "cpe:2.3:a:etherpad:etherpad:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "04955F09-99FB-4B0B-BA82-84EF7B5EB859" } ] } ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2015/04/11/1", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2015/04/12/1", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/74056", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://github.com/ether/etherpad-lite/commit/9d4e5f6", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] } ] }