First published: Tue Sep 10 2019(Updated: )
In Couchbase Server 5.0.0, when an invalid Remote Cluster Certificate was entered as part of the reference creation, XDCR did not parse and check the certificate signature. It then accepted the invalid certificate and attempted to use it to establish future connections to the remote cluster. This has been fixed in version 5.5.0. XDCR now checks the validity of the certificate thoroughly and prevents a remote cluster reference from being created with an invalid certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Couchbase Couchbase Server | =5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-11497.
The severity of CVE-2019-11497 is high (CVSS score: 7.5).
Couchbase Server 5.0.0 is affected by CVE-2019-11497.
CVE-2019-11497 allows the acceptance of an invalid remote cluster certificate, which can be used to establish future connections to the remote cluster.
Yes, it is recommended to upgrade to a fixed version of Couchbase Server to address CVE-2019-11497.