9.8
CVSSv3

CVE-2022-24706

Published: 26/04/2022 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In Apache CouchDB before 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache couchdb

Vendor Advisories

An attacker can access an improperly secured default installation without authenticating and gain admin privileges CouchDB 322 and onwards will refuse to start with the former default Erlang cookie value of 'monster' Installations that upgrade to this versions are forced to choose a different value In addition, all binary packages have been u ...

Exploits

In Apache CouchDB versions prior to 322, an attacker can access an improperly secured default installation without authenticating and gain admin privileges ...
Apache CouchDB version 321 suffers from a remote code execution vulnerability ...

Github Repositories

CVE-2022-24706 POC exploit

CVE-2022-24706 CVE-2022-24706 POC exploit

有关阿帕奇服务的poc验证

Apache_poc 大部分代码经注释,到手即可使用和二次编写 请勿用于非法用途,造成一切后果自行承担!!! 展示部分代码 功能:单个检测,批量检测 说明:依赖ysoserial,请将ysoserialjar放到与本脚本同一目录 单个检测:python pocpy -u url -d domain 批量检测:python poc

I wrote a blog post about Apache CouchDB CVE-2022-24706 RCE Exploits

Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post- I wrote a blog post about Apache CouchDB CVE-2022-24706 RCE Exploits

Apache CouchDB 3.2.1 - Remote Code Execution (RCE)

Apache CouchDB 321 - Remote Code Execution (RCE) CVE-2022-24706 Date: 2022-01-21 Exploit Author: Konstantin Burov, @_sadshade Software Link: couchdbapacheorg/ Version: 321 and below Tested on: Kali 20212 Based on 1F98D's Erlang Cookie - Remote Code Execution Shodan: port:4369 "name couchdb at" CVE: CVE-2022-24706 References: habrcom/ru/pos