Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.
References
Link | Resource |
---|---|
https://www.couchbase.com/resources/security#VulnerabilityReporting | Vendor Advisory |
Configurations
Information
Published : 2020-11-12 13:15
Updated : 2020-11-30 07:12
NVD link : CVE-2020-24719
Mitre link : CVE-2020-24719
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
couchbase
- couchbase_server