![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.146930 |
Category: | Databases |
Title: | Apache CouchDB <= 3.1.1 Privilege Escalation Vulnerability - Linux |
Summary: | Apache CouchDB is prone to a privilege escalation vulnerability. |
Description: | Summary: Apache CouchDB is prone to a privilege escalation vulnerability. Vulnerability Insight: A malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. Vulnerability Impact: This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. Affected Software/OS: Apache CouchDB version 3.1.1 and prior. Solution: Update to version 3.1.2, 3.2.0 or later. CVSS Score: 6.0 CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-38295 https://docs.couchdb.org/en/stable/cve/2021-38295.html |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |