Executive Summary

Informations
NameCVE-2017-12635First vendor Publication2017-11-14
VendorCveLast vendor Modification2019-05-13

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12635

CWE : Common Weakness Enumeration

%idName
100 %CWE-264Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application34

Snort® IPS/IDS

DateDescription
2017-12-19Apache CouchDB remote privilege escalation attempt
RuleID : 44890 - Revision : 3 - Type : SERVER-OTHER

Metasploit Database

idDescription
2016-04-06 Apache CouchDB Arbitrary Command Execution

Nessus® Vulnerability Scanner

DateDescription
2018-07-12Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_1e54d140849311e8a7950028f8d09152.nasl - Type : ACT_GATHER_INFO
2018-01-22Name : The remote Debian host is missing a security update.
File : debian_DLA-1252.nasl - Type : ACT_GATHER_INFO
2018-01-15Name : The remote Fedora host is missing one or more security updates.
File : fedora_2017-a20d92573b.nasl - Type : ACT_GATHER_INFO
2017-11-20Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201711-16.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/101868
CONFIRM https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr...
EXPLOIT-DB https://www.exploit-db.com/exploits/44498/
https://www.exploit-db.com/exploits/45019/
GENTOO https://security.gentoo.org/glsa/201711-16
MLIST https://lists.apache.org/thread.html/6c405bf3f8358e6314076be9f48c89a2e0ddf005...
https://lists.debian.org/debian-lts-announce/2018/01/msg00026.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
DateInformations
2019-05-14 00:19:03
  • Multiple Updates
2018-09-12 12:06:49
  • Multiple Updates
2018-07-28 09:19:20
  • Multiple Updates
2018-04-26 09:19:26
  • Multiple Updates
2018-02-05 13:21:33
  • Multiple Updates
2017-12-04 21:22:58
  • Multiple Updates
2017-11-21 13:24:01
  • Multiple Updates
2017-11-21 09:22:04
  • Multiple Updates
2017-11-19 12:04:12
  • Multiple Updates
2017-11-15 00:23:21
  • First insertion