Code Injection in Couchbase Server - CVE-2019-11495

 

Code Injection in Couchbase Server - CVE-2019-11495

Published: September 10, 2019 / Updated: August 8, 2020


Vulnerability identifier: #VU35511
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2019-11495
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Couchbase
Affected software:
Couchbase Server

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

In Couchbase Server 5.1.1, the cookie used for intra-node communication was not generated securely. Couchbase Server uses erlang:now() to seed the PRNG which results in a small search space for potential random seeds that could then be used to brute force the cookie and execute code against a remote system. This has been fixed in version 6.0.0.


How to mitigate CVE-2019-11495

Install update from vendor's website.

Sources