First published: Tue Aug 17 2010(Updated: )
Apache CouchDB prior to 0.11.2 and 1.0.1 are vulnerable to cross site request forgery (CSRF) attacks. A malicious web site can POST arbitrary JavaScript code to wellknown CouchDB installation URLs and make the browser execute the injected JavaScript in the security context of CouchDB's admin interface Futon. This issue has been assigned the name <a href="https://access.redhat.com/security/cve/CVE-2010-2234">CVE-2010-2234</a>. References: <a href="http://seclists.org/fulldisclosure/2010/Aug/199">http://seclists.org/fulldisclosure/2010/Aug/199</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | <0.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-624764 is high due to the potential for cross site request forgery (CSRF) attacks.
To fix REDHAT-BUG-624764, upgrade Apache CouchDB to version 0.11.2 or later.
Apache CouchDB versions prior to 0.11.2 and 1.0.1 are vulnerable to REDHAT-BUG-624764.
REDHAT-BUG-624764 involves cross site request forgery (CSRF) attacks enabling malicious JavaScript execution.
System administrators and users of Apache CouchDB are responsible for addressing REDHAT-BUG-624764 by applying the necessary updates.