First published: Tue Aug 17 2010(Updated: )
Apache CouchDB prior to 0.11.2 and 1.0.1 are vulnerable to cross site request forgery (CSRF) attacks. A malicious web site can POST arbitrary JavaScript code to wellknown CouchDB installation URLs and make the browser execute the injected JavaScript in the security context of CouchDB's admin interface Futon. This issue has been assigned the name <a href="https://access.redhat.com/security/cve/CVE-2010-2234">CVE-2010-2234</a>. References: <a href="http://seclists.org/fulldisclosure/2010/Aug/199">http://seclists.org/fulldisclosure/2010/Aug/199</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | =0.9.0 | |
Apache CouchDB | =0.9.1 | |
Apache CouchDB | =0.11.0 | |
Apache CouchDB | =0.8.1 | |
Apache CouchDB | =0.10.1 | |
Apache CouchDB | =0.9.2 | |
Apache CouchDB | =0.10.0 | |
Apache CouchDB | =0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2234 is classified as a medium severity vulnerability due to its potential for cross site request forgery attacks.
To fix CVE-2010-2234, update your Apache CouchDB installation to version 0.11.2 or 1.0.1 or later.
CVE-2010-2234 affects Apache CouchDB versions 0.8.0 through 0.11.0, and 0.9.x up to 0.9.2.
CVE-2010-2234 describes a cross site request forgery (CSRF) attack that can exploit vulnerabilities in CouchDB.
Attackers can use CVE-2010-2234 to POST arbitrary JavaScript code to CouchDB installation URLs, executing it in the context of the application's admin interface.