CVE-2020-24719

Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:15

Type Values Removed Values Added
References () https://www.couchbase.com/resources/security#VulnerabilityReporting - Vendor Advisory () https://www.couchbase.com/resources/security#VulnerabilityReporting - Vendor Advisory

Information

Published : 2020-11-12 21:15

Updated : 2024-11-21 05:15


NVD link : CVE-2020-24719

Mitre link : CVE-2020-24719

CVE.ORG link : CVE-2020-24719


JSON object : View

Products Affected

couchbase

  • couchbase_server
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')