Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.
References
Link | Resource |
---|---|
https://www.couchbase.com/resources/security#VulnerabilityReporting | Vendor Advisory |
https://www.couchbase.com/resources/security#VulnerabilityReporting | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.couchbase.com/resources/security#VulnerabilityReporting - Vendor Advisory |
Information
Published : 2020-11-12 21:15
Updated : 2024-11-21 05:15
NVD link : CVE-2020-24719
Mitre link : CVE-2020-24719
CVE.ORG link : CVE-2020-24719
JSON object : View
Products Affected
couchbase
- couchbase_server
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')