CVE-2022-26311
https://notcve.org/view.php?id=CVE-2022-26311
Couchbase Operator 2.2.x before 2.2.3 exposes Sensitive Information to an Unauthorized Actor. Secrets are not redacted in logs collected from Kubernetes environments. Couchbase Operator versiones 2.2.x anteriores a 2.2.3, expone información confidencial a un actor no autorizado. Los secretos no están redactados en los registros recogidos de los entornos Kubernetes • https://docs.couchbase.com/operator/current/overview.html https://www.couchbase.com/alerts •
CVE-2021-43963
https://notcve.org/view.php?id=CVE-2021-43963
An issue was discovered in Couchbase Sync Gateway 2.7.0 through 2.8.2. The bucket credentials used to read and write data in Couchbase Server were insecurely being stored in the metadata within sync documents written to the bucket. Users with read access could use these credentials to obtain write access. (This issue does not affect clusters where Sync Gateway is authenticated with X.509 client certificates. This issue also does not affect clusters where shared bucket access is not enabled on Sync Gateway.) • https://www.couchbase.com/alerts • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2021-42763
https://notcve.org/view.php?id=CVE-2021-42763
Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the "@" user credentials of the node processing the UI request. Couchbase Server versiones anteriores a 6.6.3 y 7.x anteriores a 7.0.2, almacena información confidencial en texto sin cifrar. El problema se produce cuando el administrador de clústeres reenvía una petición HTTP desde la UI pluggable (query workbench, etc.) al servicio específico. • https://docs.couchbase.com/server/current/release-notes/relnotes.html https://www.couchbase.com/alerts • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2021-37842
https://notcve.org/view.php?id=CVE-2021-37842
metakv in Couchbase Server 7.0.0 uses Cleartext for Storage of Sensitive Information. Remote Cluster XDCR credentials can get leaked in debug logs. Config key tombstone purging was added in Couchbase Server 7.0.0. This issue happens when a config key, which is being logged, has a tombstone purger time-stamp attached to it. metakv en Couchbase Server versión 7.0.0, usa texto sin Cifrar para el almacenamiento de información confidencial. Las credenciales de cluster remoto XDCR pueden filtrarse en los registros de depuración. • https://docs.couchbase.com/server/current/release-notes/relnotes.html https://www.couchbase.com/alerts • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2021-35944
https://notcve.org/view.php?id=CVE-2021-35944
Couchbase Server 6.5.x, 6.6.x through 6.6.2, and 7.0.0 has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached. Couchbase Server versiones 6.5.x, 6.6.x hasta 6.6.2, y 7.0.0, presenta un desbordamiento del búfer. Un paquete de red especialmente diseñado enviado por un atacante puede bloquear memcached • https://docs.couchbase.com/server/current/release-notes/relnotes.html https://www.couchbase.com/alerts • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •