2.14. CVE-2021-38295: Apache CouchDB Privilege Escalation
Date
12.10.2021
Affected
3.1.1 and below
Severity
Low
Vendor
The Apache Software Foundation
2.14.1. Description
A malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality.
This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes.
2.14.2. Mitigation
CouchDB 3.2.0 and onwards adds Content-Security-Policy headers for all attachment, _show and _list requests. This breaks certain niche use-cases and there are configuration options to restore the previous behaviour for those who need it.
CouchDB 3.1.2 defaults to the previous behaviour, but adds configuration options to turn Content-Security-Policy headers on for all affected requests.
2.14.3. Credit
This issue was identified by Cory Sabol of Secure Ideas.