First published: Wed Feb 02 2011(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface (aka Futon) in Apache CouchDB 0.8.0 through 1.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | =0.9.0 | |
Apache CouchDB | =0.11.1 | |
Apache CouchDB | =0.9.1 | |
Apache CouchDB | =1.0.1 | |
Apache CouchDB | =0.11.0 | |
Apache CouchDB | =0.10.2 | |
Apache CouchDB | =1.0.0 | |
Apache CouchDB | =0.8.1 | |
Apache CouchDB | =0.10.1 | |
Apache CouchDB | =0.9.2 | |
Apache CouchDB | =0.11.2 | |
Apache CouchDB | =0.10.0 | |
Apache CouchDB | =0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3854 can result in remote attackers executing arbitrary web scripts or HTML leading to cross-site scripting (XSS) attacks.
To mitigate risks from CVE-2010-3854, it is essential to upgrade to a patched version of Apache CouchDB that addresses the cross-site scripting vulnerabilities.
CVE-2010-3854 affects Apache CouchDB versions from 0.8.0 up to and including 1.0.1.
CVE-2010-3854 is a known vulnerability that falls under the category of cross-site scripting, which is prevalent in many web applications.
If your system runs an affected version of Apache CouchDB, you should update to a secure version immediately to protect against potential XSS attacks.