Vulnerability Details : CVE-2022-24706

In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
Published 2022-04-26 10:15:35
Updated 2022-11-21 19:28:03
View at NVD,   CVE.org
Public exploit exists!

Threat overview for CVE-2022-24706

Top countries where our scanners detected CVE-2022-24706
Top open port discovered on systems with this issue 443
IPs affected by CVE-2022-24706 184
Threat actors abusing to this issue? Yes
Find out if you* are affected by CVE-2022-24706!
*Directly or indirectly through your vendors, service providers and 3rd parties. Powered by attack surface intelligence from SecurityScorecard.
CVE-2022-24706 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Apache CouchDB Insecure Default Initialization of Resource Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Apache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.
Notes:
https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00
Added on 2022-08-25 Action due date 2022-09-15

Exploit prediction scoring system (EPSS) score for CVE-2022-24706

Probability of exploitation activity in the next 30 days: 97.38%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2022-24706

  • Apache Couchdb Erlang RCE
    Disclosure Date: 2022-01-21
    First seen: 2022-12-23
    exploit/multi/http/apache_couchdb_erlang_rce
    In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. Authors: - Milton Valencia (wetw0rk) - 1F98D - Konstantin Burov - _sadshade - jheysel-r7

CVSS scores for CVE-2022-24706

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
nvd@nist.gov
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
nvd@nist.gov

CWE ids for CVE-2022-24706

References for CVE-2022-24706

Products affected by CVE-2022-24706

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!