CVE-2021-43963

An issue was discovered in Couchbase Sync Gateway 2.7.0 through 2.8.2. The bucket credentials used to read and write data in Couchbase Server were insecurely being stored in the metadata within sync documents written to the bucket. Users with read access could use these credentials to obtain write access. (This issue does not affect clusters where Sync Gateway is authenticated with X.509 client certificates. This issue also does not affect clusters where shared bucket access is not enabled on Sync Gateway.)
References
Link Resource
https://www.couchbase.com/alerts Vendor Advisory
https://www.couchbase.com/alerts Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:couchbase:sync_gateway:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:30

Type Values Removed Values Added
References () https://www.couchbase.com/alertsĀ - Vendor Advisory () https://www.couchbase.com/alertsĀ - Vendor Advisory

Information

Published : 2021-12-07 22:15

Updated : 2024-11-21 06:30


NVD link : CVE-2021-43963

Mitre link : CVE-2021-43963

CVE.ORG link : CVE-2021-43963


JSON object : View

Products Affected

couchbase

  • sync_gateway
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor