CVE-2017-12635

Published: Nov 14, 2017 Last Modified: Apr 20, 2025
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,8
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 10,0
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9419
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

269

Improper Privilege Management

Draft
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
View CWE Details
Exploit

Apache CouchDB 1.7.0 / 2.x < 2.1.1 - …

Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation

View Exploit Code →
Exploit

Apache CouchDB - Arbitrary Command Execution (Metasploit)

Verified Remote

Apache CouchDB - Arbitrary Command Execution (Metasploit)

View Exploit Code →
Application

Couchdb by Apache

cpe:2.3:a:apache:couchdb:2.0.0:rc1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Couchdb by Apache

cpe:2.3:a:apache:couchdb:2.0.0:rc4:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Couchdb by Apache

cpe:2.3:a:apache:couchdb:2.0.0:rc2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Couchdb by Apache

cpe:2.3:a:apache:couchdb:2.0.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Couchdb by Apache

cpe:2.3:a:apache:couchdb:2.0.0:rc3:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Couchdb by Apache

Version Range Affected
To 1.7.0 (exclusive)
cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://lists.apache.org/thread.html/6c405bf3f8358e6314076be9f48c89a2e0ddf00539…
https://lists.debian.org/debian-lts-announce/2018/01/msg00026.html
https://security.gentoo.org/glsa/201711-16
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hp…
https://www.exploit-db.com/exploits/44498/
https://www.exploit-db.com/exploits/45019/
http://www.securityfocus.com/bid/101868
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/101868
https://lists.apache.org/thread.html/6c405bf3f8358e6314076be9f48c89a2e0ddf00539…
https://lists.debian.org/debian-lts-announce/2018/01/msg00026.html
https://security.gentoo.org/glsa/201711-16
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hp…
https://www.exploit-db.com/exploits/44498/
https://www.exploit-db.com/exploits/45019/
http://www.securityfocus.com/bid/101868
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/101868