Learn about CVE-2021-43802 affecting Etherpad-lite versions < 1.8.16. Discover the critical impact, vulnerability description, affected systems, exploitation, and mitigation steps.
Etherpad is a real-time collaborative editor. In versions prior to 1.8.16, an attacker can craft a malicious
.etherpad file, allowing the attacker to gain admin privileges and execute arbitrary code on the Etherpad instance. This can have a critical impact on confidentiality, integrity, and availability.
Understanding CVE-2021-43802
What is CVE-2021-43802?
Etherpad is vulnerable to admin privilege escalation and arbitrary code execution through malicious imports. This occurs in versions below 1.8.16 due to improper validation, enabling an attacker to exploit the system.
The Impact of CVE-2021-43802
The vulnerability has a critical severity rating with a base score of 9.9 (CVSS v3.1), posing a high risk to confidentiality, integrity, and availability of the system.
Technical Details of CVE-2021-43802
Vulnerability Description
.etherpad file for privilege escalationAffected Systems and Versions
Exploitation Mechanism
express-session state or waits for cleanupMitigation and Prevention
Immediate Steps to Take
/p/*/import requestsexpress_sid cookie valuesLong-Term Security Practices
Patching and Updates