Mandriva Linux Security Advisory : couchdb (MDVSA-2013:067)
2013-04-20T00:00:00
ID MANDRIVA_MDVSA-2013-067.NASL Type nessus Reporter This script is Copyright (C) 2013-2021 Tenable Network Security, Inc. Modified 2013-04-20T00:00:00
A security flaw was found in the way Apache CouchDB, a
distributed,fault- tolerant and schema-free document-oriented database
accessible via a RESTful HTTP/JSON API, processed certain JSON
callback. A remote attacker could provide a specially crafted JSON
callback that, when processed could lead to arbitrary JSON code
execution via Adobe Flash (CVE-2012-5649).
A DOM based cross-site scripting (XSS) flaw was found in the way
browser- based test suite of Apache CouchDB, a distributed,
fault-tolerant and schema-free document-oriented database accessible
via a RESTful HTTP/JSON API, processed certain query parameters. A
remote attacker could provide a specially crafted web page that, when
accessed could lead to arbitrary web script or HTML execution in the
context of a CouchDB user session (CVE-2012-5650).
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandriva Linux Security Advisory MDVSA-2013:067.
# The text itself is copyright (C) Mandriva S.A.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(66081);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2012-5649", "CVE-2012-5650");
script_bugtraq_id(57314, 57321);
script_xref(name:"MDVSA", value:"2013:067");
script_xref(name:"MGASA", value:"2013-0040");
script_name(english:"Mandriva Linux Security Advisory : couchdb (MDVSA-2013:067)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Mandriva Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"Updated couchdb packages fix security vulnerabilities :
A security flaw was found in the way Apache CouchDB, a
distributed,fault- tolerant and schema-free document-oriented database
accessible via a RESTful HTTP/JSON API, processed certain JSON
callback. A remote attacker could provide a specially crafted JSON
callback that, when processed could lead to arbitrary JSON code
execution via Adobe Flash (CVE-2012-5649).
A DOM based cross-site scripting (XSS) flaw was found in the way
browser- based test suite of Apache CouchDB, a distributed,
fault-tolerant and schema-free document-oriented database accessible
via a RESTful HTTP/JSON API, processed certain query parameters. A
remote attacker could provide a specially crafted web page that, when
accessed could lead to arbitrary web script or HTML execution in the
context of a CouchDB user session (CVE-2012-5650)."
);
script_set_attribute(
attribute:"solution",
value:"Update the affected couchdb and / or couchdb-bin packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:couchdb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:couchdb-bin");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1");
script_set_attribute(attribute:"patch_publication_date", value:"2013/04/08");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/04/20");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"couchdb-1.2.1-1.mbs1")) flag++;
if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"couchdb-bin-1.2.1-1.mbs1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "MANDRIVA_MDVSA-2013-067.NASL", "bulletinFamily": "scanner", "title": "Mandriva Linux Security Advisory : couchdb (MDVSA-2013:067)", "description": "Updated couchdb packages fix security vulnerabilities :\n\nA security flaw was found in the way Apache CouchDB, a\ndistributed,fault- tolerant and schema-free document-oriented database\naccessible via a RESTful HTTP/JSON API, processed certain JSON\ncallback. A remote attacker could provide a specially crafted JSON\ncallback that, when processed could lead to arbitrary JSON code\nexecution via Adobe Flash (CVE-2012-5649).\n\nA DOM based cross-site scripting (XSS) flaw was found in the way\nbrowser- based test suite of Apache CouchDB, a distributed,\nfault-tolerant and schema-free document-oriented database accessible\nvia a RESTful HTTP/JSON API, processed certain query parameters. A\nremote attacker could provide a specially crafted web page that, when\naccessed could lead to arbitrary web script or HTML execution in the\ncontext of a CouchDB user session (CVE-2012-5650).", "published": "2013-04-20T00:00:00", "modified": "2013-04-20T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/66081", "reporter": "This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.", "references": [], "cvelist": ["CVE-2012-5650", "CVE-2012-5649"], "type": "nessus", "lastseen": "2021-01-07T11:54:05", "edition": 24, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-5649", "CVE-2012-5650"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:28959", "SECURITYVULNS:VULN:12828", "SECURITYVULNS:DOC:28960"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310865288", "OPENVAS:865297", "OPENVAS:1361412562310865297", "OPENVAS:865288"]}, {"type": "nessus", "idList": ["FEDORA_2013-1375.NASL", "FEDORA_2013-1387.NASL", "FREEBSD_PKG_4FB45A1CC5D011E28400001B216147B0.NASL", "COUCHDB_1_2_1.NASL"]}, {"type": "fedora", "idList": ["FEDORA:2817920D1F", "FEDORA:F3A2920DD0"]}, {"type": "freebsd", "idList": ["4FB45A1C-C5D0-11E2-8400-001B216147B0"]}], "modified": "2021-01-07T11:54:05", "rev": 2}, "score": {"value": 6.3, "vector": "NONE", "modified": "2021-01-07T11:54:05", "rev": 2}, "vulnersScore": 6.3}, "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2013:067. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(66081);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-5649\", \"CVE-2012-5650\");\n script_bugtraq_id(57314, 57321);\n script_xref(name:\"MDVSA\", value:\"2013:067\");\n script_xref(name:\"MGASA\", value:\"2013-0040\");\n\n script_name(english:\"Mandriva Linux Security Advisory : couchdb (MDVSA-2013:067)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated couchdb packages fix security vulnerabilities :\n\nA security flaw was found in the way Apache CouchDB, a\ndistributed,fault- tolerant and schema-free document-oriented database\naccessible via a RESTful HTTP/JSON API, processed certain JSON\ncallback. A remote attacker could provide a specially crafted JSON\ncallback that, when processed could lead to arbitrary JSON code\nexecution via Adobe Flash (CVE-2012-5649).\n\nA DOM based cross-site scripting (XSS) flaw was found in the way\nbrowser- based test suite of Apache CouchDB, a distributed,\nfault-tolerant and schema-free document-oriented database accessible\nvia a RESTful HTTP/JSON API, processed certain query parameters. A\nremote attacker could provide a specially crafted web page that, when\naccessed could lead to arbitrary web script or HTML execution in the\ncontext of a CouchDB user session (CVE-2012-5650).\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected couchdb and / or couchdb-bin packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:couchdb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:couchdb-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/04/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/04/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"couchdb-1.2.1-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"couchdb-bin-1.2.1-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Mandriva Local Security Checks", "pluginID": "66081", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:couchdb", "p-cpe:/a:mandriva:linux:couchdb-bin"], "scheme": null}
{"cve": [{"lastseen": "2020-12-09T19:47:26", "description": "Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1 allows remote attackers to execute arbitrary code via a JSONP callback, related to Adobe Flash.", "edition": 5, "cvss3": {}, "published": "2014-05-23T14:55:00", "title": "CVE-2012-5649", "type": "cve", "cwe": ["CWE-94"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5649"], "modified": "2014-05-30T00:16:00", "cpe": ["cpe:/a:apache:couchdb:1.0.2", "cpe:/a:apache:couchdb:1.1.1", "cpe:/a:apache:couchdb:1.0.0", "cpe:/a:apache:couchdb:1.1.0", "cpe:/a:apache:couchdb:1.2.0", "cpe:/a:apache:couchdb:1.0.1", "cpe:/a:apache:couchdb:1.0.3"], "id": "CVE-2012-5649", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5649", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:apache:couchdb:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.2.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:47:26", "description": "Cross-site scripting (XSS) vulnerability in the Futon UI in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters to the browser-based test suite.", "edition": 5, "cvss3": {}, "published": "2014-03-18T17:02:00", "title": "CVE-2012-5650", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5650"], "modified": "2014-05-31T04:17:00", "cpe": ["cpe:/a:apache:couchdb:1.0.2", "cpe:/a:apache:couchdb:1.1.1", "cpe:/a:apache:couchdb:1.0.0", "cpe:/a:apache:couchdb:1.1.0", "cpe:/a:apache:couchdb:1.2.0", "cpe:/a:apache:couchdb:1.0.1", "cpe:/a:apache:couchdb:1.0.3"], "id": "CVE-2012-5650", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5650", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:apache:couchdb:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.2.0:*:*:*:*:*:*:*"]}], "securityvulns": [{"lastseen": "2018-08-31T11:10:46", "bulletinFamily": "software", "cvelist": ["CVE-2012-5649"], "description": "\r\n\r\nCVE-2012-5649\r\n\r\nJSONP arbitrary code execution with Adobe Flash\r\n\r\nSeverity: Moderate\r\n\r\nVendor: The Apache Software Foundation\r\n \r\nAffected Versions:\r\nJSONP is supported but disabled by default in all currently supported\r\nreleases of Apache CouchDB. Administrator access is required to enable it.\r\nReleases up to and including 1.0.3, 1.1.1, and 1.2.0 are vulnerable, if\r\nadministrators have enabled JSONP.\r\n\r\nDescription:\r\nA hand-crafted JSONP callback and response can be used to run\r\narbitrary code inside client-side browsers via Adobe Flash.\r\n\r\nMitigation:\r\nUpgrade to a supported release that includes this fix, such as\r\nCouchDB 1.0.4, 1.1.2, 1.2.1, and the future 1.3.x series, all of which\r\ninclude a specific fix.\r\n\r\nWork-Around:\r\nDisable JSONP.\r\n\r\nJan Lehnardt\r\n-- \r\n", "edition": 1, "modified": "2013-01-14T00:00:00", "published": "2013-01-14T00:00:00", "id": "SECURITYVULNS:DOC:28960", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28960", "title": "CVE-2012-5649 Apache CouchDB JSONP arbitrary code execution with Adobe Flash", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:46", "bulletinFamily": "software", "cvelist": ["CVE-2012-5650"], "description": "\r\n\r\nCVE-2012-5650 \r\n\r\nDOM based Cross-Site Scripting via Futon UI\r\n\r\nAffected Versions:\r\nApache CouchDB releases up to and including 1.0.3, 1.1.1, and 1.2.0 \r\nare vulnerable.\r\n\r\nDescription:\r\nQuery parameters passed into the browser-based test suite are not sanitised,\r\nand can be used to load external resources. An attacker may execute JavaScript\r\ncode in the browser, using the context of the remote user.\r\n\r\nMitigation:\r\nUpgrade to a supported release that includes this fix, such as Apache\r\nCouchDB 1.0.4, 1.1.2, 1.2.1, and the future 1.3.x series, all of which\r\ninclude a specific fix.\r\n\r\nWork-Around:\r\nDisable the Futon user interface completely, by adapting `local.ini` and\r\nrestarting CouchDB:\r\n\r\n [httpd_global_handlers]\r\n _utils = {couch_httpd_misc_handlers, handle_welcome_req, <<"Forbidden">>}\r\n\r\nOr by removing the UI test suite components:\r\n\r\n share/www/verify_install.html\r\n share/www/couch_tests.html\r\n share/www/custom_test.html\r\n\r\nAcknowledgement:\r\nThis vulnerability was discovered & reported to the Apache Software Foundation\r\nby Frederik Braun https://frederik-braun.com/\r\n\r\nJan Lehnardt\r\n-- \r\n", "edition": 1, "modified": "2013-01-14T00:00:00", "published": "2013-01-14T00:00:00", "id": "SECURITYVULNS:DOC:28959", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28959", "title": "CVE-2012-5650 Apache CouchDB DOM based Cross-Site Scripting via Futon UI", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:09:50", "bulletinFamily": "software", "cvelist": ["CVE-2012-5650", "CVE-2012-5190", "CVE-2012-5641", "CVE-2012-5649"], "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 1, "modified": "2013-01-14T00:00:00", "published": "2013-01-14T00:00:00", "id": "SECURITYVULNS:VULN:12828", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12828", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2018-01-18T11:08:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5650", "CVE-2012-5649"], "description": "Check for the Version of couchdb", "modified": "2018-01-18T00:00:00", "published": "2013-02-04T00:00:00", "id": "OPENVAS:865297", "href": "http://plugins.openvas.org/nasl.php?oid=865297", "type": "openvas", "title": "Fedora Update for couchdb FEDORA-2013-1387", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for couchdb FEDORA-2013-1387\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_solution = \"Please Install the Updated Packages.\";\ntag_insight = \"Apache CouchDB is a distributed, fault-tolerant and schema-free\n document-oriented database accessible via a RESTful HTTP/JSON API.\n Among other features, it provides robust, incremental replication\n with bi-directional conflict detection and resolution, and is\n queryable and indexable using a table-oriented view engine with\n JavaScript acting as the default view definition language.\";\ntag_affected = \"couchdb on Fedora 17\";\n\n\n\n\nif(description)\n{\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098092.html\");\n script_id(865297);\n script_version(\"$Revision: 8456 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-18 07:58:40 +0100 (Thu, 18 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-02-04 09:52:48 +0530 (Mon, 04 Feb 2013)\");\n script_cve_id(\"CVE-2012-5649\", \"CVE-2012-5650\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2013-1387\");\n script_name(\"Fedora Update for couchdb FEDORA-2013-1387\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of couchdb\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n if ((res = isrpmvuln(pkg:\"couchdb\", rpm:\"couchdb~1.2.1~2.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5650", "CVE-2012-5649"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-02-04T00:00:00", "id": "OPENVAS:1361412562310865288", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865288", "type": "openvas", "title": "Fedora Update for couchdb FEDORA-2013-1375", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for couchdb FEDORA-2013-1375\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098089.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865288\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-02-04 09:50:56 +0530 (Mon, 04 Feb 2013)\");\n script_cve_id(\"CVE-2012-5649\", \"CVE-2012-5650\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2013-1375\");\n script_name(\"Fedora Update for couchdb FEDORA-2013-1375\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'couchdb'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n script_tag(name:\"affected\", value:\"couchdb on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n if ((res = isrpmvuln(pkg:\"couchdb\", rpm:\"couchdb~1.2.1~2.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-01-26T11:10:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5650", "CVE-2012-5649"], "description": "Check for the Version of couchdb", "modified": "2018-01-26T00:00:00", "published": "2013-02-04T00:00:00", "id": "OPENVAS:865288", "href": "http://plugins.openvas.org/nasl.php?oid=865288", "type": "openvas", "title": "Fedora Update for couchdb FEDORA-2013-1375", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for couchdb FEDORA-2013-1375\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"couchdb on Fedora 18\";\ntag_insight = \"Apache CouchDB is a distributed, fault-tolerant and schema-free\n document-oriented database accessible via a RESTful HTTP/JSON API.\n Among other features, it provides robust, incremental replication\n with bi-directional conflict detection and resolution, and is\n queryable and indexable using a table-oriented view engine with\n JavaScript acting as the default view definition language.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098089.html\");\n script_id(865288);\n script_version(\"$Revision: 8542 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-26 07:57:28 +0100 (Fri, 26 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-02-04 09:50:56 +0530 (Mon, 04 Feb 2013)\");\n script_cve_id(\"CVE-2012-5649\", \"CVE-2012-5650\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-1375\");\n script_name(\"Fedora Update for couchdb FEDORA-2013-1375\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of couchdb\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n if ((res = isrpmvuln(pkg:\"couchdb\", rpm:\"couchdb~1.2.1~2.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5650", "CVE-2012-5649"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-02-04T00:00:00", "id": "OPENVAS:1361412562310865297", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865297", "type": "openvas", "title": "Fedora Update for couchdb FEDORA-2013-1387", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for couchdb FEDORA-2013-1387\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_tag(name:\"affected\", value:\"couchdb on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098092.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865297\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-02-04 09:52:48 +0530 (Mon, 04 Feb 2013)\");\n script_cve_id(\"CVE-2012-5649\", \"CVE-2012-5650\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2013-1387\");\n script_name(\"Fedora Update for couchdb FEDORA-2013-1387\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'couchdb'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n if ((res = isrpmvuln(pkg:\"couchdb\", rpm:\"couchdb~1.2.1~2.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2012-5649", "CVE-2012-5650"], "description": "Apache CouchDB is a distributed, fault-tolerant and schema-free document-oriented database accessible via a RESTful HTTP/JSON API. Among other features, it provides robust, incremental replication with bi-directional conflict detection and resolution, and is queryable and indexable using a table-oriented view engine with JavaScript acting as the default view definition language. ", "modified": "2013-02-02T04:27:53", "published": "2013-02-02T04:27:53", "id": "FEDORA:2817920D1F", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 17 Update: couchdb-1.2.1-2.fc17", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2012-5649", "CVE-2012-5650"], "description": "Apache CouchDB is a distributed, fault-tolerant and schema-free document-oriented database accessible via a RESTful HTTP/JSON API. Among other features, it provides robust, incremental replication with bi-directional conflict detection and resolution, and is queryable and indexable using a table-oriented view engine with JavaScript acting as the default view definition language. ", "modified": "2013-02-02T04:25:54", "published": "2013-02-02T04:25:54", "id": "FEDORA:F3A2920DD0", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: couchdb-1.2.1-2.fc18", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-12T10:10:57", "description": " - Ver. 1.2.1 (security bugfix release)\n\n - Unbundle snappy (see rhbz #871149)\n\n - Add _isa to the Requires\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2013-02-04T00:00:00", "title": "Fedora 18 : couchdb-1.2.1-2.fc18 (2013-1375)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5650", "CVE-2012-5649"], "modified": "2013-02-04T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:18", "p-cpe:/a:fedoraproject:fedora:couchdb"], "id": "FEDORA_2013-1375.NASL", "href": "https://www.tenable.com/plugins/nessus/64411", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-1375.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64411);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-5649\", \"CVE-2012-5650\");\n script_xref(name:\"FEDORA\", value:\"2013-1375\");\n\n script_name(english:\"Fedora 18 : couchdb-1.2.1-2.fc18 (2013-1375)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Ver. 1.2.1 (security bugfix release)\n\n - Unbundle snappy (see rhbz #871149)\n\n - Add _isa to the Requires\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=871149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=895597\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-February/098089.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d5ab77a2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected couchdb package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:couchdb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:18\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/02/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^18([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 18.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC18\", reference:\"couchdb-1.2.1-2.fc18\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"couchdb\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:10:57", "description": " - Ver. 1.2.1 (security bugfix release)\n\n - Unbundle snappy (see rhbz #871149)\n\n - Add _isa to the Requires\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2013-02-04T00:00:00", "title": "Fedora 17 : couchdb-1.2.1-2.fc17 (2013-1387)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5650", "CVE-2012-5649"], "modified": "2013-02-04T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:17", "p-cpe:/a:fedoraproject:fedora:couchdb"], "id": "FEDORA_2013-1387.NASL", "href": "https://www.tenable.com/plugins/nessus/64413", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-1387.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64413);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-5649\", \"CVE-2012-5650\");\n script_xref(name:\"FEDORA\", value:\"2013-1387\");\n\n script_name(english:\"Fedora 17 : couchdb-1.2.1-2.fc17 (2013-1387)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Ver. 1.2.1 (security bugfix release)\n\n - Unbundle snappy (see rhbz #871149)\n\n - Add _isa to the Requires\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=871149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=895597\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-February/098092.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?04529ce2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected couchdb package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:couchdb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:17\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/02/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^17([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 17.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC17\", reference:\"couchdb-1.2.1-2.fc17\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"couchdb\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T01:33:58", "description": "According to its banner, the version of CouchDB running on the remote\nhost is earlier than 1.0.4, 1.1.x earlier than 1.1.2 or 1.2.x earlier\nthan 1.2.1. It is, therefore, potentially affected by the following\nvulnerabilities :\n\n - An unspecified error exists in the included MochiWeb\n HTTP library that can allow access to arbitrary files\n via directory traversal attacks. Note that reportedly,\n this issue only affects installs on Windows hosts.\n (CVE-2012-5641)\n\n - An error related to JSONP callbacks can allow an\n unspecified cross-site scripting attack. (CVE-2012-5649)\n\n - An input validation error exists related to unspecified\n query parameters and the Futon UI that can allow DOM-\n based cross-site scripting attacks. (CVE-2012-5650)\n\nNote that Nessus did not actually test for these flaws but instead, has\nrelied on the version in CouchDB's banner.", "edition": 25, "published": "2013-01-22T00:00:00", "title": "Apache CouchDB < 1.0.4 / 1.1.2 / 1.2.1 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5650", "CVE-2012-5641", "CVE-2012-5649"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apache:couchdb"], "id": "COUCHDB_1_2_1.NASL", "href": "https://www.tenable.com/plugins/nessus/63642", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63642);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/12/04\");\n\n script_cve_id(\"CVE-2012-5641\", \"CVE-2012-5649\", \"CVE-2012-5650\");\n script_bugtraq_id(57313, 57314, 57321);\n\n script_name(english:\"Apache CouchDB < 1.0.4 / 1.1.2 / 1.2.1 Multiple Vulnerabilities\");\n script_summary(english:\"Does a paranoid banner check on the web server\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote database server is potentially affected by multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its banner, the version of CouchDB running on the remote\nhost is earlier than 1.0.4, 1.1.x earlier than 1.1.2 or 1.2.x earlier\nthan 1.2.1. It is, therefore, potentially affected by the following\nvulnerabilities :\n\n - An unspecified error exists in the included MochiWeb\n HTTP library that can allow access to arbitrary files\n via directory traversal attacks. Note that reportedly,\n this issue only affects installs on Windows hosts.\n (CVE-2012-5641)\n\n - An error related to JSONP callbacks can allow an\n unspecified cross-site scripting attack. (CVE-2012-5649)\n\n - An input validation error exists related to unspecified\n query parameters and the Futon UI that can allow DOM-\n based cross-site scripting attacks. (CVE-2012-5650)\n\nNote that Nessus did not actually test for these flaws but instead, has\nrelied on the version in CouchDB's banner.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/525297/30/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/525299/30/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/525300/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to CouchDB 1.0.4 / 1.1.2 / 1.2.1 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-5649\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/01/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/22\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apache:couchdb\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"couchdb_detect.nasl\");\n script_require_keys(\"Settings/ParanoidReport\", \"www/couchdb\");\n script_require_ports(\"Services/www\", 5984, 6984);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"webapp_func.inc\");\n\nport = get_http_port(default:5984);\ninstall = get_install_from_kb(appname:\"couchdb\", port:port, exit_on_fail:TRUE);\n\nversion = install['ver'];\nif (version == UNKNOWN_VER) audit(AUDIT_SERVICE_VER_FAIL, \"CouchDB\", port);\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nif (version =~ \"^1(\\.[0-2])?$\") exit(1, \"The banner from the CouchDB install listening on port \"+port+\" - \"+version+\" - is not granular enough to make a determination.\");\n\nver_fields = split(version, sep:'.', keep:FALSE);\nfor (i=0; i < max_index(ver_fields); i++)\n ver_fields[i] = int(ver_fields[i]);\n\nif (\n ver_fields[0] == 0 ||\n (\n ver_fields[0] == 1 &&\n (\n (ver_fields[1] == 0 && ver_fields[2] < 4) ||\n (ver_fields[1] == 1 && ver_fields[2] < 2) ||\n (ver_fields[1] == 2 && ver_fields[2] < 1)\n )\n )\n)\n{\n set_kb_item(name:'www/'+port+'/XSS', value:TRUE);\n if (report_verbosity > 0)\n {\n source = get_kb_item(\"www/\"+port+\"/couchdb/source\");\n if (!source) source = \"n/a\";\n\n report = \n '\\n Version source : ' + source +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 1.0.4 / 1.1.2 / 1.2.1\\n';\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"CouchDB\", port, version);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:43:22", "description": "Jan Lehnardt reports :\n\nQuery parameters passed into the browser-based test suite are not\nsanitised, and can be used to load external resources. An attacker may\nexecute JavaScript code in the browser, using the context of the\nremote user.", "edition": 21, "published": "2013-05-28T00:00:00", "title": "FreeBSD : couchdb -- DOM based XSS via Futon UI (4fb45a1c-c5d0-11e2-8400-001b216147b0)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5650"], "modified": "2013-05-28T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:couchdb"], "id": "FREEBSD_PKG_4FB45A1CC5D011E28400001B216147B0.NASL", "href": "https://www.tenable.com/plugins/nessus/66630", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(66630);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-5650\");\n\n script_name(english:\"FreeBSD : couchdb -- DOM based XSS via Futon UI (4fb45a1c-c5d0-11e2-8400-001b216147b0)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Jan Lehnardt reports :\n\nQuery parameters passed into the browser-based test suite are not\nsanitised, and can be used to load external resources. An attacker may\nexecute JavaScript code in the browser, using the context of the\nremote user.\"\n );\n # http://mail-archives.apache.org/mod_mbox/couchdb-user/201301.mbox/%3C2FFF2FD7-8EAF-4EBF-AFDA-5AEB6EAC853F@apache.org%3E\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d541abff\"\n );\n # https://vuxml.freebsd.org/freebsd/4fb45a1c-c5d0-11e2-8400-001b216147b0.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5219bd3c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:couchdb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/01/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/05/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/05/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"couchdb<1.2.1,1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:37", "bulletinFamily": "unix", "cvelist": ["CVE-2012-5650"], "description": "\nJan Lehnardt reports:\n\nQuery parameters passed into the browser-based test suite\n\t are not sanitised, and can be used to load external resources.\n\t An attacker may execute JavaScript code in the browser, using\n\t the context of the remote user.\n\n", "edition": 4, "modified": "2012-01-14T00:00:00", "published": "2012-01-14T00:00:00", "id": "4FB45A1C-C5D0-11E2-8400-001B216147B0", "href": "https://vuxml.freebsd.org/freebsd/4fb45a1c-c5d0-11e2-8400-001b216147b0.html", "title": "couchdb -- DOM based Cross-Site Scripting via Futon UI", "type": "freebsd", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}