Vulnerability Name:

CVE-2018-11769

Assigned:2018-08-08
Published:2018-08-08
Updated:2018-08-10
Summary:CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.
CVSS v3 Severity:4.7 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L)
4.1 Medium (CCN Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
References:Source: BID
Type: UNKNOWN
105046

Source: XF
Type: UNKNOWN
apache-couchdb-cve201811769-code-exec(148094)

Source: MISC
Type: UNKNOWN
https://lists.apache.org/thread.html/1052ad7a1b32b9756df4f7860f5cb5a96b739f444117325a19a4bf75@%3Cdev.couchdb.apache.org%3E

Oval Definitions
Definition IDClassTitleLast Modified
oval:com.ubuntu.trusty:def:201811769000
V
CVE-2018-11769 on Ubuntu 14.04 LTS (trusty) - medium.
2018-08-08
oval:com.ubuntu.xenial:def:201811769000
V
CVE-2018-11769 on Ubuntu 16.04 LTS (xenial) - medium.
2018-08-08
BACK