Vulnerability Details : CVE-2022-24706
Public exploit exists!
In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
Products affected by CVE-2022-24706
- cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
Threat overview for CVE-2022-24706
Top countries where our scanners detected CVE-2022-24706
Top open port discovered on systems with this issue
443
IPs affected by CVE-2022-24706 252
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2022-24706!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
CVE-2022-24706 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Apache CouchDB Insecure Default Initialization of Resource Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Apache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.
Notes:
https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00; https://nvd.nist.gov/vuln/detail/CVE-2022-24706
Added on
2022-08-25
Action due date
2022-09-15
Exploit prediction scoring system (EPSS) score for CVE-2022-24706
97.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2022-24706
-
Apache Couchdb Erlang RCE
Disclosure Date: 2022-01-21First seen: 2022-12-23exploit/multi/http/apache_couchdb_erlang_rceIn Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. Authors: - Milton Valencia (wetw0rk) - 1F98D - Konstantin Burov - _sadshade - jheysel-r7
CVSS scores for CVE-2022-24706
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-24706
-
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.Assigned by:
- nvd@nist.gov (Secondary)
- security@apache.org (Primary)
References for CVE-2022-24706
-
https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00
CVE-2022-24706: Apache CouchDB Remote Privilege Escalation-Apache Mail ArchivesMailing List;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2022/05/09/4
oss-security - Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in PackagingMailing List;Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/05/09/2
oss-security - Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in PackagingMailing List;Patch;Third Party Advisory
-
http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html
Apache CouchDB 3.2.1 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2022/05/09/1
oss-security - Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in PackagingMailing List;Third Party Advisory
-
http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html
Apache CouchDB Erlang Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2022/05/09/3
oss-security - Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in PackagingMailing List;Patch;Third Party Advisory
-
https://docs.couchdb.org/en/3.2.2/setup/cluster.html
2.2. Cluster Set Up — Apache CouchDB® 3.2 DocumentationProduct
-
http://www.openwall.com/lists/oss-security/2022/04/26/1
oss-security - CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in PackagingMailing List;Third Party Advisory
-
https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd
CouchDB, Erlang and cookies — RCE on default settings | by Konstantin Burov | MediumExploit;Third Party Advisory
Jump to