CVE-2021-38295

In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-269 CWE-79

20 Oct 2021, 15:31

Type Values Removed Values Added
References (MISC) https://docs.couchdb.org/en/stable/cve/2021-38295.html - (MISC) https://docs.couchdb.org/en/stable/cve/2021-38295.html - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.0
v3 : 7.3
CWE CWE-269
CPE cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*

14 Oct 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-14 20:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-38295

Mitre link : CVE-2021-38295

CVE.ORG link : CVE-2021-38295


JSON object : View

Products Affected

apache

  • couchdb
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')