First published: Wed Jul 11 2018(Updated: )
Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | <=1.7.1 | |
Apache CouchDB | >=2.0.0<=2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8007 is a vulnerability in Apache CouchDB that allows an administrative user to escalate their privileges to that of the operating system's user.
CVE-2018-8007 has a severity rating of critical, with a severity value of 7.2.
Apache CouchDB versions up to and including 1.7.1, as well as versions between 2.0.0 and 2.1.1, are affected by CVE-2018-8007.
A CouchDB administrator user can exploit CVE-2018-8007 by supplying insufficiently validated configuration settings via the HTTP API, allowing them to escalate their privileges.
Yes, you can find references for CVE-2018-8007 at the following links: - [Reference 1](http://mail-archives.apache.org/mod_mbox/couchdb-announce/201807.mbox/%3C1699016538.6219.1531246785603.JavaMail.Joan%40RITA%3E) - [Reference 2](http://mail-archives.apache.org/mod_mbox/couchdb-announce/201807.mbox/%3c1439409216.6221.1531246856676.JavaMail.Joan@RITA%3e) - [Reference 3](http://www.securityfocus.com/bid/104741)