ID UB:CVE-2018-9327
Type ubuntucve
Reporter ubuntu.com
Modified 2018-04-07T00:00:00
Description
Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to execute
arbitrary code on the server. The instance has to be configured to use a
document database (DirtyDB, CouchDB, MongoDB, or RethinkDB).
Bugs
<http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576998>
{"id": "UB:CVE-2018-9327", "vendorId": null, "type": "ubuntucve", "bulletinFamily": "info", "title": "CVE-2018-9327", "description": "Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to execute\narbitrary code on the server. The instance has to be configured to use a\ndocument database (DirtyDB, CouchDB, MongoDB, or RethinkDB).\n\n#### Bugs\n\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576998>\n", "published": "2018-04-07T00:00:00", "modified": "2018-04-07T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 5.9}, "href": "https://ubuntu.com/security/CVE-2018-9327", "reporter": "ubuntu.com", "references": ["https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9327", "http://blog.etherpad.org/2018/04/07/important-release-1-6-4/", "https://nvd.nist.gov/vuln/detail/CVE-2018-9327", "https://launchpad.net/bugs/cve/CVE-2018-9327", "https://security-tracker.debian.org/tracker/CVE-2018-9327"], "cvelist": ["CVE-2018-9327"], "immutableFields": [], "lastseen": "2021-11-22T21:36:35", "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-9327"]}], "rev": 4}, "score": {"value": 7.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2018-9327"]}]}, "exploitation": null, "vulnersScore": 7.3}, "affectedPackage": [{"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "any", "packageFilename": "UNKNOWN", "operator": "lt", "status": "needs triage", "packageName": "etherpad-lite"}], "bugs": ["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576998"], "_state": {"dependencies": 1646098579}}
{"cve": [{"lastseen": "2022-03-23T18:52:40", "description": "Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to execute arbitrary code on the server. The instance has to be configured to use a document database (DirtyDB, CouchDB, MongoDB, or RethinkDB).", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2018-04-07T21:29:00", "type": "cve", "title": "CVE-2018-9327", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-9327"], "modified": "2018-05-11T17:33:00", "cpe": ["cpe:/a:etherpad:etherpad:1.5.7"], "id": "CVE-2018-9327", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9327", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:etherpad:etherpad:1.5.7:*:*:*:*:*:*:*"]}]}