Learn about CVE-2021-43802 affecting Etherpad-lite versions < 1.8.16. Discover the critical impact, vulnerability description, affected systems, exploitation, and mitigation steps.
Etherpad is a real-time collaborative editor. In versions prior to 1.8.16, an attacker can craft a malicious
.etherpad
file, allowing the attacker to gain admin privileges and execute arbitrary code on the Etherpad instance. This can have a critical impact on confidentiality, integrity, and availability.
Understanding CVE-2021-43802
What is CVE-2021-43802?
Etherpad is vulnerable to admin privilege escalation and arbitrary code execution through malicious imports. This occurs in versions below 1.8.16 due to improper validation, enabling an attacker to exploit the system.
The Impact of CVE-2021-43802
The vulnerability has a critical severity rating with a base score of 9.9 (CVSS v3.1), posing a high risk to confidentiality, integrity, and availability of the system.
Technical Details of CVE-2021-43802
Vulnerability Description
.etherpad
file for privilege escalationAffected Systems and Versions
Exploitation Mechanism
express-session
state or waits for cleanupMitigation and Prevention
Immediate Steps to Take
/p/*/import
requestsexpress_sid
cookie valuesLong-Term Security Practices
Patching and Updates