CVE-2018-8007 Information
Share on:Description
Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system’s user that CouchDB runs under by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Reference
http://mail-archives.apache.org/mod_mbox/couchdb-announce/201807.mbox/3c1439409216.6221.1531246856676.JavaMail.Joan@RITA3e http://mail-archives.apache.org/mod_mbox/couchdb-announce/201807.mbox/3C1699016538.6219.1531246785603.JavaMail.Joan40RITA3E http://www.securityfocus.com/bid/104741 https://blog.couchdb.org/2018/07/10/cve-2018-8007/ https://lists.fedoraproject.org/archives/list/[email protected]/message/S5FPHVVU5KMRFKQTJPAM3TBGC7LKCWQS/ https://lists.fedoraproject.org/archives/list/[email protected]/message/X3JOUCX7LHDV4YWZDQNXT5NTKKRANZQW/ https://security.gentoo.org/glsa/201812-06 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03935en_us https://www.mdsec.co.uk/2018/08/advisory-cve-2018-8007-apache-couchdb-remote-code-execution/
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction Required
HIGH
Scope
NONE
Confidentiality Impact
UNCHANGED
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
HIGH
Base Severity
7.2