Security Bulletin
Summary
Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, it allowed full system entry for unauthenticated users.
Vulnerability Details
DESCRIPTION: Apache CouchDB could allow a remote authenticated attacker to gain elevated privileges on the system, caused by runtime-configuration of key components of the database. An attacker could exploit this vulnerability to gain full system entry into the underlying operating system.
CVSS Base Score: 8.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/154346 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
Remediation/Fixes
1) Customers will need to ensure they have strong admin passwords.
2) Where customers expose their clusters to the public internet, we recommend they block these paths. This can be done by using a haproxy configuration update.
Anywhere in the listen section of the config add the following:
http-request deny if { path_beg /_node }
Workarounds and Mitigations
Get Notified about Future Security Bulletins
References
Change History
17 March 2019
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
14 March 2019
UID
ibm10875784