First published: Tue Dec 07 2021(Updated: )
An issue was discovered in Couchbase Sync Gateway 2.7.0 through 2.8.2. The bucket credentials used to read and write data in Couchbase Server were insecurely being stored in the metadata within sync documents written to the bucket. Users with read access could use these credentials to obtain write access. (This issue does not affect clusters where Sync Gateway is authenticated with X.509 client certificates. This issue also does not affect clusters where shared bucket access is not enabled on Sync Gateway.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Couchbase Sync Gateway | >=2.7.0<2.8.3 | |
>=2.7.0<2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-43963 is high.
The affected software for CVE-2021-43963 is Couchbase Sync Gateway versions 2.7.0 through 2.8.2.
An attacker can exploit CVE-2021-43963 by using insecurely stored bucket credentials to read and write data in Couchbase Server.
The Common Weakness Enumeration (CWE) ID for CVE-2021-43963 is CWE-200.
To fix CVE-2021-43963, upgrade to Couchbase Sync Gateway version 2.8.3.