Permissions, Privileges, and Access Controls in CouchDB - CVE-2018-17188
Published: January 7, 2019
CouchDB
Detailed vulnerability description
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to CouchDB allows runtime-configuration of key components of the database. A CouchDB administrator can gain access to operating system components and execute code on the system with privileges of the CouchDB system user account.