2.15. CVE-2022-24706: Apache CouchDB Remote Privilege Escalation
25.04.2022
Affected
3.2.1 and below
Severity
Vendor
The Apache Software Foundation
An attacker can access an improperly secured default installation without authenticating and gain admin privileges.
The CouchDB documentation has always made recommendations for properly securing an installation, but not all users follow the advice.
We recommend a firewall in front of all CouchDB installations. The full CouchDB api is available on registered port 5984 and this is the only port that needs to be exposed for a single-node install. Installations that do not expose the separate distribution port to external access are not vulnerable.
CouchDB and onwards will refuse to start with the former default erlang cookie value of monster. Installations that upgrade to this versions are forced to choose a different value.
In addition, all binary packages have been updated to bind epmd as well as the CouchDB distribution port to 127.0.0.1 and/or ::1 respectively.