// For flags

CVE-2018-11769

Gentoo Linux Security Advisory 201812-06

Severity Score

7.2
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.

Los usuarios administrativos de CouchDB en versiones anteriores a la 2.2.0 pueden configurar el servidor de la base de datos mediante HTTP(S). Debido a la validación insuficiente de las opciones de configuración proporcionadas por el administrador mediante la API HTTP, es posible que un usuario administrador de CouchDB escale sus privilegios a los del usuario del sistema operativo bajo el que se ejecuta CouchDB. Esto se realiza mediante la omisión de la lista negra de opciones de configuración que no pueden ser modificadas mediante la API HTTP. Este escalado de privilegios permite que un usuario admin de CouchDB pueda ejecutar código de forma remota mediante la omisión del CVE-2017-12636 y el CVE-2018-8007.

Multiple vulnerabilities have been found in CouchDB, the worst of which could lead to the remote execution of code. Versions less than or equal to 2.1.2 are affected.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-06-05 CVE Reserved
  • 2018-08-08 CVE Published
  • 2024-09-16 CVE Updated
  • 2025-07-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Couchdb
Search vendor "Apache" for product "Couchdb"
< 2.2.0
Search vendor "Apache" for product "Couchdb" and version " < 2.2.0"
-
Affected