node/utils/ExportEtherpad.js in Etherpad 1.5.x before 1.5.2 might allow remote attackers to obtain sensitive information by leveraging an improper substring check when exporting a padID.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/ether/etherpad-lite/commit/a0fb65205c7d7ff95f00eb9fd88e93b300f30c3d | patch |
https://github.com/ether/etherpad-lite/releases/tag/1.5.2 | patch release notes |
http://www.openwall.com/lists/oss-security/2015/03/15/3 | issue tracking mailing list third party advisory |