CVE-2013-7380

9.8 CRITICAL

📋 TL;DR

CVE-2013-7380 is a remote command injection vulnerability in Etherpad Lite's ep_imageconvert plugin that allows attackers to execute arbitrary commands on the server. This affects all Etherpad Lite installations using the vulnerable ep_imageconvert plugin version. The vulnerability is particularly dangerous because it can be exploited without authentication.

💻 Affected Systems

Products:
  • Etherpad Lite
Versions: All versions with ep_imageconvert plugin before the fix
Operating Systems: All operating systems running Etherpad Lite
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability specifically affects the ep_imageconvert plugin which may not be installed by default in all Etherpad Lite deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with the privileges of the Etherpad Lite process, potentially leading to data theft, system takeover, or lateral movement within the network.

🟠

Likely Case

Remote code execution leading to installation of backdoors, cryptocurrency miners, or data exfiltration from the affected server.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege principles, and input validation are implemented, though the vulnerability still presents significant risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is well-documented with public proof-of-concept code available, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest Etherpad Lite version or remove ep_imageconvert plugin

Vendor Advisory: https://github.com/ether/etherpad-lite/security/advisories

Restart Required: Yes

Instructions:

1. Update Etherpad Lite to the latest version. 2. If using ep_imageconvert plugin, update it to the patched version. 3. Restart the Etherpad Lite service. 4. Verify the fix by testing the image conversion functionality.

🔧 Temporary Workarounds

Disable ep_imageconvert plugin

all

Remove or disable the vulnerable ep_imageconvert plugin to eliminate the attack vector

npm uninstall ep_imageconvert
Remove ep_imageconvert from package.json and run npm install

Network isolation

linux

Restrict network access to Etherpad Lite instance to trusted networks only

iptables -A INPUT -p tcp --dport 9001 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 9001 -j DROP

🧯 If You Can't Patch

  • Immediately disable or remove the ep_imageconvert plugin from all Etherpad Lite instances
  • Implement strict network access controls to limit exposure and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if ep_imageconvert plugin is installed: npm list ep_imageconvert

Check Version:

npm list etherpad-lite && npm list ep_imageconvert

Verify Fix Applied:

Verify ep_imageconvert plugin is removed or updated to patched version, and test image upload functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Image conversion requests with suspicious parameters
  • Unexpected process spawns from Etherpad Lite

Network Indicators:

  • HTTP POST requests to /p/:padId/upload with malicious payloads
  • Outbound connections from Etherpad Lite server to suspicious IPs

SIEM Query:

source="etherpad.log" AND ("ep_imageconvert" OR "upload") AND (cmd.exe OR bash OR sh OR python)

🔗 References

📤 Share & Export