CWE
20
Advisory Published
Updated

CVE-2018-8007: Input Validation

First published: Wed Jul 11 2018(Updated: )

Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.

Credit: security@apache.org

Affected SoftwareAffected VersionHow to fix
Apache CouchDB<=1.7.1
Apache CouchDB>=2.0.0<=2.1.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2018-8007?

    CVE-2018-8007 is a vulnerability in Apache CouchDB that allows an administrative user to escalate their privileges to that of the operating system's user.

  • What is the severity of CVE-2018-8007?

    CVE-2018-8007 has a severity rating of critical, with a severity value of 7.2.

  • Which versions of Apache CouchDB are affected by CVE-2018-8007?

    Apache CouchDB versions up to and including 1.7.1, as well as versions between 2.0.0 and 2.1.1, are affected by CVE-2018-8007.

  • How can a CouchDB administrator user exploit CVE-2018-8007?

    A CouchDB administrator user can exploit CVE-2018-8007 by supplying insufficiently validated configuration settings via the HTTP API, allowing them to escalate their privileges.

  • Are there any references for CVE-2018-8007?

    Yes, you can find references for CVE-2018-8007 at the following links: - [Reference 1](http://mail-archives.apache.org/mod_mbox/couchdb-announce/201807.mbox/%3C1699016538.6219.1531246785603.JavaMail.Joan%40RITA%3E) - [Reference 2](http://mail-archives.apache.org/mod_mbox/couchdb-announce/201807.mbox/%3c1439409216.6221.1531246856676.JavaMail.Joan@RITA%3e) - [Reference 3](http://www.securityfocus.com/bid/104741)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203