First published: Tue Dec 12 2023(Updated: )
Apache CouchDB could allow a local attacker to gain elevated privileges on the system, caused by a flaw when using design document functions. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to gain elevated privileges to insert the design documents into the database, then manipulate a user to access a function from that design document.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | <=3.3.2 | |
IBM Planning Analytics Workspace | <=2.1 | |
IBM Planning Analytics Workspace | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45725 is considered a critical vulnerability due to the potential for local attackers to gain elevated privileges.
To fix CVE-2023-45725, users should upgrade Apache CouchDB to version 3.3.3 or later.
CVE-2023-45725 affects Apache CouchDB versions up to and including 3.3.2 and IBM Planning Analytics Local versions 2.1 and 2.0.
No, CVE-2023-45725 requires local access to the system to exploit the vulnerability.
CVE-2023-45725 allows an attacker to gain elevated privileges, which could lead to unauthorized access to sensitive data or system controls.