CVE-2020-24719
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.
Una Cookie de Erlang expuesta podría conllevar a un ataque de Ejecución de Comando Remota (RCE). La comunicación entre los nodos de Erlang se realiza mediante el intercambio de un secreto compartido (también se conoce como "magic cookie"). Existen casos en los que la magic cookie se incluye en el contenido de los registros. Un atacante puede usar la cookie para adjuntar a un nodo Erlang y ejecutar comandos a nivel de Sistema Operativo en el sistema que ejecuta el nodo Erlang. Afecta a la versión: 6.5.1. Versión corregida: 6.6.0
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-08-27 CVE Reserved
- 2020-11-12 CVE Published
- 2023-07-29 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.couchbase.com/resources/security#VulnerabilityReporting | 2020-11-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Couchbase Search vendor "Couchbase" | Couchbase Server Search vendor "Couchbase" for product "Couchbase Server" | >= 6.5.1 < 6.6.0 Search vendor "Couchbase" for product "Couchbase Server" and version " >= 6.5.1 < 6.6.0" | - |
Affected
|