CVE-2019-11495
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Couchbase Server 5.1.1, the cookie used for intra-node communication was not generated securely. Couchbase Server uses erlang:now() to seed the PRNG which results in a small search space for potential random seeds that could then be used to brute force the cookie and execute code against a remote system. This has been fixed in version 6.0.0.
En Couchbase Server versión 5.1.1, la cookie utilizada para la comunicación dentro del nodo no se genera de forma segura. Couchbase Server usa erlang:now() para generar el PRNG, lo que da como resultado un pequeño espacio de búsqueda de posibles semillas aleatorias que luego podrían usarse para realizar un ataque de fuerza bruta sobre la cookie y ejecutar el código contra un sistema remoto. Esto se ha solucionado en la versión 6.0.0.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-23 CVE Reserved
- 2019-09-10 CVE Published
- 2024-05-27 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-335: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.couchbase.com/resources/security#SecurityAlerts | 2024-02-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Couchbase Search vendor "Couchbase" | Couchbase Server Search vendor "Couchbase" for product "Couchbase Server" | 5.1.1 Search vendor "Couchbase" for product "Couchbase Server" and version "5.1.1" | - |
Affected
|