Think you have a false positive on this rule?

Sid 1-46440

Message

SERVER-OTHER Apache CouchDB remote code execution attempt

Summary

This event is generated when a remote code execution attempt is detected in Apache CouchDB.

Impact

Attempted User Privilege Gain

CVE-2017-12636:

CVSS base score 7.2

CVSS impact score 5.9

CVSS exploitability score 1.2

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2017-12636: CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.

Affected systems

  • apache couchdb 1.0.0
  • apache couchdb 1.0.1
  • apache couchdb 1.0.2
  • apache couchdb 1.0.3
  • apache couchdb 1.0.4
  • apache couchdb 1.1.0
  • apache couchdb 1.1.1
  • apache couchdb 1.1.2
  • apache couchdb 1.2.0
  • apache couchdb 1.2.1
  • apache couchdb 1.5.0
  • apache couchdb 2.0.0

Ease of attack

CVE-2017-12636:

Access Vector

Access Complexity

Authentication

False positives

False negatives

Corrective action

Contributors

  • Cisco's Talos Intelligence Group

Additional References