Cross-site scripting in CouchDB - CVE-2010-3854
Published: February 2, 2011 / Updated: October 9, 2021
CouchDB
Detailed vulnerability description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in the web administration interface (aka Futon) in Apache CouchDB 0.8.0 through 1.0.1 when processing unspecified vectors. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
How to mitigate CVE-2010-3854
Sources
- http://mail-archives.apache.org/mod_mbox/couchdb-dev/201101.mbox/%3CC840F655-C8C5-4EC6-8AA8-DD223E39C34A@apache.org%3E
- http://osvdb.org/70734
- http://secunia.com/advisories/43111
- http://www.securityfocus.com/archive/1/516058/100/0/threaded
- http://www.securityfocus.com/bid/46066
- http://www.securitytracker.com/id?1025013
- http://www.vupen.com/english/advisories/2011/0263
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65050