Apache CouchDB < 0.11.2 Futon admin interface Cross-Site Request Forgery

medium Nessus Plugin ID 48382

Synopsis

The remote database server is affected by a cross-site request forgery vulnerability.

Description

According to its banner, the version of CouchDB running on the remote host is affected by a cross-site request forgery vulnerability. The application fails to properly sanitize user-supplied input before it is used in the Futon admin interface.

A remote attacker could exploit this to execute arbitrary script code in the security context of CouchDB's admin interface.

Solution

Upgrade to CouchDB 0.11.2 or later.

See Also

https://seclists.org/fulldisclosure/2010/Aug/199

Plugin Details

Severity: Medium

ID: 48382

File Name: couchdb_0_11_2.nasl

Version: 1.13

Type: remote

Family: Databases

Published: 8/20/2010

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:apache:couchdb

Required KB Items: Settings/ParanoidReport, www/couchdb

Exploit Ease: No known exploits are available

Patch Publication Date: 8/17/2010

Vulnerability Publication Date: 8/17/2010

Reference Information

CVE: CVE-2010-2234

BID: 42501

Secunia: 40998