Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2E21B176-6B0C-4EC9-AC85-814CCD7B02AB", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6A021FEF-DBC8-455A-945A-96CE411091C0", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CBB9277-A9C7-4979-8CD6-5DAF20B21022", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B5085F7-7BF6-4C34-9D2D-2738A49B21D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "643BCCDE-77EF-4551-8CAD-390C4AB0289E", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "41A2C651-7345-4354-B112-21DBCD176BF9", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DC65D6-8950-4EF2-880E-2916AAB2B544", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "810D72F9-71E7-47A8-9496-7EF0F7F96BAF", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4F28C6F-31ED-4A86-A8CB-A7F3FE80463D", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "554B75F7-6CF0-47AD-AB49-1519DC5E5FC1", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "47725F83-A7FB-47AC-9868-EEC0D9BE7F85", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "856989B3-F1CA-4CE3-8B0D-BF1D040FF407", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "00362C25-0438-4928-866C-7BE99C569987", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "272184D3-C079-4D69-9C99-B9C22576DD15", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "3ECA2014-464B-4140-9B22-9704DB16274B", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FA27831F-08D4-488A-922F-D0FA210A9882", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "6C5829CF-4DBB-44CD-B989-F5D3A4EC6D9E", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "5629C43A-9910-45EA-A43F-C7CA22FC4434", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.81:*:*:*:*:*:*:*", "matchCriteriaId": "9865B41A-F7BA-4281-AE08-5E9D821C5310", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.91:*:*:*:*:*:*:*", "matchCriteriaId": "4CD2B7A2-34F9-48EB-90E5-93C8D2167D75", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2C42AC6-B0C9-4468-BD0D-589916E29AAB", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "08B94664-ED9A-4459-B84E-9D552A6C4EEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDD7903B-96A0-4022-ADD8-306155E4595B", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB82785A-1099-4730-9782-803F0577EFDE", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB1BC2A6-1B10-457A-AC41-F500CABF8C41", "vulnerable": true}, {"criteria": "cpe:2.3:a:etherpad:etherpad:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "04955F09-99FB-4B0B-BA82-84EF7B5EB859", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.1 through 1.5.2 allows remote attackers to read arbitrary files by leveraging replacement of backslashes with slashes in the path parameter of HTTP API requests."}, {"lang": "es", "value": "Una vulnerabilidad de salto de directorio en node/utils/Minify.js en Etherpad desde la versi\u00f3n 1.1.1 hasta la 1.5.2 permite que atacantes remotos lean archivos arbitrarios aprovechando el reemplazo de barras diagonales inversas por barras diagonales en el par\u00e1metro path de peticiones API HTTP."}], "id": "CVE-2015-3297", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-07-07T16:29:00.173", "references": [{"source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://www.openwall.com/lists/oss-security/2015/04/11/1"}, {"source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://www.openwall.com/lists/oss-security/2015/04/12/1"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/74056"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/ether/etherpad-lite/commit/9d4e5f6"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://www.openwall.com/lists/oss-security/2015/04/11/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://www.openwall.com/lists/oss-security/2015/04/12/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/74056"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/ether/etherpad-lite/commit/9d4e5f6"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}