CVE-2018-8007: Apache CouchDB privilege escalation via HTTP API
Reporter | Title | Published | Views | Family All 67 |
---|---|---|---|---|
![]() | Input validation | 11 Jul 201813:29 | – | prion |
![]() | Input validation | 8 Aug 201815:29 | – | prion |
![]() | Design/Logic Flaw | 14 Nov 201720:29 | – | prion |
![]() | Design/Logic Flaw | 14 Nov 201720:29 | – | prion |
![]() | CVE-2018-8007 | 11 Jul 201813:00 | – | cvelist |
![]() | CVE-2018-11769 | 8 Aug 201815:00 | – | cvelist |
![]() | CVE-2017-12636 | 14 Nov 201720:00 | – | cvelist |
![]() | CVE-2017-12635 | 14 Nov 201720:00 | – | cvelist |
![]() | CVE-2018-8007 | 11 Jul 201813:29 | – | osv |
![]() | CVE-2018-11769 | 8 Aug 201815:29 | – | osv |
[
{
"product": "Apache CouchDB",
"vendor": "Apache Software Foundation",
"versions": [
{
"status": "affected",
"version": "< 1.7.2"
},
{
"status": "affected",
"version": "2.0.0 to 2.1.1"
}
]
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
file:read_file | request body | /diag/eval | Couchbase Server's 'diag/eval' endpoint allows authenticated users to execute arbitrary Erlang code, leading to privilege escalation and remote code execution. | CWE-20 |
os:cmd | request body | /diag/eval | Couchbase Server's 'diag/eval' endpoint allows authenticated users to execute arbitrary Erlang code, leading to privilege escalation and remote code execution. | CWE-20 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo