En

Apache CouchDB官网安全更新(2018-04-30)

来源:Apache CouchDB官网 发布日期:2018-04-30 阅读次数:273 评论:0

基本信息

发布日期:2018-04-30(官方当地时间)

更新类型:安全更新

更新版本:未知

感知时间:2019-12-05 19:41:38

风险等级:低危

情报贡献:TSRC

更新标题

2.12. CVE-2018-8007: Apache CouchDB Remote Code Execution

更新详情


2.12. CVE-2018-8007: Apache CouchDB Remote Code Execution




Date:30.04.2018

Affected:All Versions of Apache CouchDB

Severity:Low

Vendor:The Apache Software Foundation




2.12.1. Description
CouchDB administrative users can configure the database server via HTTP(S). Due
to insufficient validation of administrator-supplied configuration settings via
the HTTP API, it is possible for a CouchDB administrator user to escalate their
privileges to that of the operating system’s user that CouchDB runs under, by
bypassing the backlist of configuration settings that are not allowed to be
modified via the HTTP API.
This privilege escalation effectively allows a CouchDB admin user to gain
arbitrary remote code execution, bypassing
CVE-2017-12636


2.12.2. Mitigation
All users should upgrade to CouchDB 1.7.2 or
2.1.2.
Upgrades from previous 1.x and 2.x versions in the same series should be
seamless.
Users on earlier versions, or users upgrading from 1.x to 2.x should consult
with upgrade notes.


2.12.3. Credit
This issue was discovered by Francesco Oddo of MDSec Labs.

软件描述

CouchDB 是一个开源的面向文档的数据库管理系统,可以通过 RESTful JavaScript Object Notation (JSON) API 访问

CVE编号

TSRC分析

暂无

业界资讯

暂无

评论

提交评论 您输入的评论有误,请重新输入