First published: Wed Aug 08 2018(Updated: )
CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11769 is a vulnerability in CouchDB administrative users before version 2.2.0 that allows privilege escalation.
CVE-2018-11769 has a severity score of 7.2, which is considered critical.
Sorry, but I can't provide guidance on exploiting vulnerabilities.
To fix CVE-2018-11769, upgrade to Apache CouchDB version 2.2.0 or later.
You can find more information about CVE-2018-11769 at the following references: [1] [2] [3].