An issue was discovered in Couchbase Sync Gateway 2.7.0 through 2.8.2. The bucket credentials used to read and write data in Couchbase Server were insecurely being stored in the metadata within sync documents written to the bucket. Users with read access could use these credentials to obtain write access. (This issue does not affect clusters where Sync Gateway is authenticated with X.509 client certificates. This issue also does not affect clusters where shared bucket access is not enabled on Sync Gateway.)
References
Link | Resource |
---|---|
https://www.couchbase.com/alerts | Vendor Advisory |
https://www.couchbase.com/alerts | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.couchbase.com/alertsĀ - Vendor Advisory |
Information
Published : 2021-12-07 22:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-43963
Mitre link : CVE-2021-43963
CVE.ORG link : CVE-2021-43963
JSON object : View
Products Affected
couchbase
- sync_gateway
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor