Apache CouchDB官网安全更新(2020-05-19)

情报来源:TSRC

发布时间:2020-05-19

基本信息
  • 发布日期2020-05-19
  • 感知时间2020-05-19
  • 漏洞类型安全更新
  • 风险等级中危
  • 更新版本未知
  • 情报贡献TSRC
更新标题

2.13. CVE-2020-1955: Apache CouchDB Remote Privilege Escalation

更新详情

<br/>2.13. CVE-2020-1955: Apache CouchDB Remote Privilege Escalation<br/><br/><br/><br/><br/>Date:19.05.2020<br/><br/>Affected:3.0.0<br/><br/>Severity:Medium<br/><br/>Vendor:The Apache Software Foundation<br/><br/><br/><br/><br/>2.13.1. Description<br/>CouchDB version 3.0.0 shipped with a new configuration setting that<br/>governs access control to the entire database server called<br/>require_valid_user_except_for_up. It was meant as an extension to the<br/>long-standing setting require_valid_user, which in turn requires that<br/>any and all requests to CouchDB will have to be made with valid<br/>credentials, effectively forbidding any anonymous requests.<br/>The new require_valid_user_except_for_up is an off-by-default setting<br/>that was meant to allow requiring valid credentials for all endpoints<br/>except for the /_up endpoint.<br/>However, the implementation of this made an error that lead to not<br/>enforcing credentials on any endpoint, when enabled.<br/>CouchDB versions 3.0.1 and 3.1.0 fix this issue.<br/><br/><br/>2.13.2. Mitigation<br/>Users who have not enabled require_valid_user_except_for_up are not<br/>affected.<br/>Users who have it enabled can either disable it again, or upgrade to<br/>CouchDB versions 3.0.1 and 3.1.0<br/><br/><br/>2.13.3. Credit<br/>This issue was discovered by Stefan Klein.<br/><br/>

软件描述

CouchDB 是一个开源的面向文档的数据库管理系统,可以通过 RESTful JavaScript Object Notation (JSON) API 访问

CVE编号

<p><a target="_blank" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1955">CVE-2020-1955</a></p>

Knowsafe分析

暂无

业界资讯

暂无

来源链接

http://docs.couchdb.org/en/stable/cve/2020-1955.html