CVE-2018-9845
📋 TL;DR
CVE-2018-9845 is an authentication bypass vulnerability in Etherpad Lite that allows unauthenticated attackers to gain administrative access. This affects all Etherpad Lite instances running versions before 1.6.4. Attackers can take full control of the application and potentially compromise the underlying server.
💻 Affected Systems
- Etherpad Lite
📦 What is this software?
Etherpad Lite by Etherpad
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the Etherpad instance, data theft/manipulation, and potential server takeover through subsequent attacks.
Likely Case
Unauthorized administrative access leading to data manipulation, user impersonation, and disruption of collaborative editing sessions.
If Mitigated
Limited impact if network segmentation and strict access controls prevent external exploitation attempts.
🎯 Exploit Status
Simple HTTP request manipulation can trigger the vulnerability. Public exploit code is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.6.4
Vendor Advisory: https://github.com/ether/etherpad-lite/blob/develop/CHANGELOG.md
Restart Required: Yes
Instructions:
1. Backup your Etherpad data and settings. 2. Update to Etherpad Lite 1.6.4 or later using npm: 'npm update etherpad-lite'. 3. Restart the Etherpad service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to Etherpad instances using firewall rules
iptables -A INPUT -p tcp --dport 9001 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 9001 -j DROP
Reverse Proxy with Authentication
allPlace Etherpad behind a reverse proxy with authentication requirements
🧯 If You Can't Patch
- Isolate Etherpad instances in a separate network segment with strict access controls
- Implement web application firewall rules to block suspicious authentication attempts
🔍 How to Verify
Check if Vulnerable:
Check Etherpad version via web interface or by examining package.json file
Check Version:
grep version /path/to/etherpad/package.json
Verify Fix Applied:
Confirm version is 1.6.4 or later and test authentication functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual admin login attempts from unexpected IPs
- Multiple failed authentication attempts followed by successful admin access
Network Indicators:
- HTTP requests manipulating authentication parameters
- Traffic patterns showing admin access from unauthenticated sources
SIEM Query:
source="etherpad.log" AND ("admin" OR "authentication") AND status="200" AND user="anonymous"
🔗 References
- https://github.com/ether/etherpad-lite/blob/develop/CHANGELOG.md
- https://github.com/ether/etherpad-lite/commit/ffe24c3dd93efc73e0cbf924db9a0cc40be9511b
- https://github.com/ether/etherpad-lite/blob/develop/CHANGELOG.md
- https://github.com/ether/etherpad-lite/commit/ffe24c3dd93efc73e0cbf924db9a0cc40be9511b