|
|||
Rule General Information |
---|
Release Date: | 2021-11-01 | |
Rule Name: | Apache Couchdb Remote Privilege Escalation Vulnerability (CVE-2017-12635) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Apache CouchDB is a free, open-source, document oriented database developed by the Apache Software Foundation in the United States. It is a NoSQL database that uses JSON as the storage format, JavaScript as the query language, and MapReduce and HTTP as APIs. There is a security vulnerability in Apache CouchDB versions before 1.7.0 and 2. x before 2.1.1, due to differences between rlang based and JavaScript based JSON parsers. Attackers can exploit this vulnerability to access arbitrary shell commands or gain administrator privileges. | |
Impact: | An attacker can abtain more privileges which he is not entitled to by exloiting the vulnerability, such as executing arbitrary code, deleting files, viewing sensitive information, changing configurations. | |
Affected OS: | Windows, Linux, Others | |
Reference: | SecurityFocusBID:101868 ExploitDB:44498 https://lists.apache.org/thread.html/6c405bf3f8358e6314076be9f48c89a2e0ddf00539906291ebdf0c67@%3Cdev.couchdb.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/01/msg00026.html |
|
Solutions |
---|
The vendor has released upgrade patches to fix vulnerabilities, please visit: https://lists.apache.org/thread.html/6c405bf3f8358e6314076be9f48c89a2e0ddf00539906291ebdf0c67@%3Cdev.couchdb.apache.org%3E |