Apache CouchDB < 1.0.2 Futon Admin Interface XSS

medium Nessus Plugin ID 51923

Synopsis

The remote database server is affected by a cross-site scripting vulnerability.

Description

According to its banner, the version of CouchDB running on the remote host is affected by a cross-site scripting vulnerability. The application fails to properly sanitize user-supplied input before it is used in the Futon admin interface.

A remote attacker could exploit this to execute arbitrary script code in the security context of CouchDB's admin interface.

Note that Nessus did not actually test for the flaw but instead has relied on the version in CouchDB's banner so this may be a false positive.

Solution

Upgrade to CouchDB 1.0.2 or later.

See Also

http://www.nessus.org/u?a644bca1

Plugin Details

Severity: Medium

ID: 51923

File Name: couchdb_1_0_2.nasl

Version: 1.10

Type: remote

Family: Databases

Published: 2/9/2011

Updated: 7/6/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:apache:couchdb

Required KB Items: Settings/ParanoidReport, www/couchdb

Exploit Ease: No known exploits are available

Patch Publication Date: 1/27/2011

Vulnerability Publication Date: 1/28/2011

Reference Information

CVE: CVE-2010-3854

BID: 46066

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

Secunia: 43111