vendor:
CouchDB
by:
Cody Zacharias
7.2
CVSS
HIGH
Remote Code Execution
20
CWE
Product Name: CouchDB
Affected Version From: <= 1.7.0
Affected Version To: 2.x - 2.1.0
Patch Exists: YES
Related CWE: CVE-2017-12636
CPE: a:apache:couchdb
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2018-11769/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2018-8007/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2018-11769/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-12635/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2017-12636/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-12636/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2018-8007/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2017-12635/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=104697, https://www.infosecmatter.com/nessus-plugin-library/?id=105943, https://www.infosecmatter.com/nessus-plugin-library/?id=111018, https://www.infosecmatter.com/nessus-plugin-library/?id=106208, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/apache_couchdb_cmd_exec, https://www.infosecmatter.com/nessus-plugin-library/?id=97419, https://www.infosecmatter.com/nessus-plugin-library/?id=99128, https://www.infosecmatter.com/list-of-metasploit-linux-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=97191
Platforms Tested: Debian
2017
Apache CouchDB < 2.1.0 - Remote Code Execution
A vulnerability in Apache CouchDB allowed an attacker to execute arbitrary shell commands on the server. This vulnerability was caused by the lack of input validation in the configuration API. An attacker could send a specially crafted request to the configuration API and execute arbitrary shell commands on the server. This vulnerability affected versions <= 1.7.0 and 2.x - 2.1.0.
Mitigation:
Upgrade to Apache CouchDB version 2.1.1 or later.