First published: Tue Sep 10 2019(Updated: )
In versions of Couchbase Server prior to 5.0, the bucket named "default" was a special bucket that allowed read and write access without authentication. As part of 5.0, the behavior of all buckets including "default" were changed to only allow access by authenticated users with sufficient authorization. However, users were allowed unauthenticated and unauthorized access to the "default" bucket if the properties of this bucket were edited. This has been fixed in versions 5.1.0 and 5.5.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Couchbase Couchbase Server | <=5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Couchbase Server vulnerability is CVE-2019-11496.
The severity level of CVE-2019-11496 is critical with a score of 9.1.
Versions of Couchbase Server prior to 5.0 are affected by CVE-2019-11496.
In versions prior to 5.0, the "default" bucket allowed read and write access without authentication.
In version 5.0, the behavior of all buckets, including the "default" bucket, was changed to only allow access by authenticated users with sufficient authorization.
To fix the vulnerability, upgrade your Couchbase Server to a version later than 5.0.