First published: Tue Nov 14 2017(Updated: )
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | <1.7.0 | |
Apache CouchDB | =2.0.0 | |
Apache CouchDB | =2.0.0-rc1 | |
Apache CouchDB | =2.0.0-rc2 | |
Apache CouchDB | =2.0.0-rc3 | |
Apache CouchDB | =2.0.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12636 is considered a critical vulnerability due to its ability to allow arbitrary command execution by an administrative user.
To fix CVE-2017-12636, upgrade Apache CouchDB to version 1.7.0 or higher, or to version 2.1.1 or higher.
CVE-2017-12636 affects Apache CouchDB versions before 1.7.0 and 2.x before 2.1.1.
An attacker with access to CouchDB administrative capabilities can execute arbitrary system-level commands through configured binary paths.
As a workaround for CVE-2017-12636, restrict administrative access and avoid using vulnerable versions until the software is upgraded.