SB2014031805 - Multiple vulnerabilities in CouchDB
Published: March 18, 2014 Updated: October 9, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Code Injection (CVE-ID: CVE-2012-5649)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1 allows remote attackers to execute arbitrary code via a JSONP callback, related to Adobe Flash.
2) Cross-site scripting (CVE-ID: CVE-2012-5650)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in the Futon UI in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.
References
- http://archives.neohapsis.com/archives/bugtraq/2013-01/0057.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098089.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098092.html
- http://secunia.com/advisories/51765
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:067
- http://www.securityfocus.com/bid/57314
- http://archives.neohapsis.com/archives/bugtraq/2013-01/0056.html
- http://mail-archives.apache.org/mod_mbox/couchdb-user/201301.mbox/%3C2FFF2FD7-8EAF-4EBF-AFDA-5AEB6EAC853F@apache.org%3E