First published: Tue Aug 17 2010(Updated: )
Apache CouchDB prior to 0.11.2 and 1.0.1 are vulnerable to cross site request forgery (CSRF) attacks. A malicious web site can POST arbitrary JavaScript code to wellknown CouchDB installation URLs and make the browser execute the injected JavaScript in the security context of CouchDB's admin interface Futon. This issue has been assigned the name <a href="https://access.redhat.com/security/cve/CVE-2010-2234">CVE-2010-2234</a>. References: <a href="http://seclists.org/fulldisclosure/2010/Aug/199">http://seclists.org/fulldisclosure/2010/Aug/199</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | =0.9.0 | |
Apache CouchDB | =0.9.1 | |
Apache CouchDB | =0.11.0 | |
Apache CouchDB | =0.8.1 | |
Apache CouchDB | =0.10.1 | |
Apache CouchDB | =0.9.2 | |
Apache CouchDB | =0.10.0 | |
Apache CouchDB | =0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.