Vulnerability Name:

CVE-2022-24706 (CCN-225177)

Assigned:2022-04-26
Published:2022-04-26
Updated:2022-11-21
Summary:In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.1 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.1 Critical (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-1188
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2022-24706

Source: MISC
Type: Exploit, Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html

Source: MISC
Type: Exploit, Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20220426 CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging

Source: CCN
Type: Apache Web site
Apache CouchDB

Source: MISC
Type: Product
https://docs.couchdb.org/en/3.2.2/setup/cluster.html

Source: XF
Type: UNKNOWN
apache-cve202224706-priv-esc(225177)

Source: MISC
Type: Mailing List, Vendor Advisory
https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00

Source: MISC
Type: Exploit, Third Party Advisory
https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd

Source: CCN
Type: Packet Storm Security [05-11-2022]
Apache CouchDB 3.2.1 Remote Code Execution

Source: CCN
Type: Packet Storm Security [11-02-2022]
Apache CouchDB Erlang Remote Code Execution Apache CouchDB Erlang Remote Code Execution

Source: CCN
Type: oss-sec Mailing List, Tue, 26 Apr 2022 08:44:41 +0000
CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-11-2022]

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:couchdb:*:*:*:*:*:*:*:* (Version < 3.2.2)

  • Configuration CCN 1:
  • cpe:/a:apache:couchdb:3.2.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apache couchdb *
    apache couchdb 3.2.1