Vulnerabilities (CVE)

Filtered by vendor Couchbase Subscribe
Filtered by product Couchbase Server
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-45875 1 Couchbase 1 Couchbase Server 2023-11-16 N/A 7.5 HIGH
An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.log while adding a pre-7.0 node to a 7.2 cluster.
CVE-2023-36667 1 Couchbase 1 Couchbase Server 2023-11-15 N/A 7.5 HIGH
Couchbase Server 7.1.4 before 7.1.5 and 7.2.0 before 7.2.1 allows Directory Traversal.
CVE-2022-32557 1 Couchbase 1 Couchbase Server 2023-08-08 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Couchbase Server before 7.0.4. The Index Service does not enforce authentication for TCP/TLS servers.
CVE-2022-42951 1 Couchbase 1 Couchbase Server 2023-08-08 N/A 8.1 HIGH
An issue was discovered in Couchbase Server 6.5.x and 6.6.x before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2. During the start-up of a Couchbase Server node, there is a small window of time (before the cluster management authentication has started) where an attacker can connect to the cluster manager using default credentials.
CVE-2022-32560 1 Couchbase 1 Couchbase Server 2023-08-08 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Couchbase Server before 7.0.4. XDCR lacks role checking when changing internal settings.
CVE-2022-32556 1 Couchbase 1 Couchbase Server 2022-07-27 N/A 7.5 HIGH
An issue was discovered in Couchbase Server before 7.0.4. A private key is leaked to the log files with certain crashes.
CVE-2022-33173 1 Couchbase 1 Couchbase Server 2022-07-20 5.0 MEDIUM 7.5 HIGH
An algorithm-downgrade issue was discovered in Couchbase Server before 7.0.4. Analytics Remote Links may temporarily downgrade to non-TLS connection to determine the TLS port number, using SCRAM-SHA instead.
CVE-2022-32564 1 Couchbase 1 Couchbase Server 2022-06-22 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Couchbase Server before 7.0.4. In couchbase-cli, server-eshell leaks the Cluster Manager cookie.
CVE-2022-32192 1 Couchbase 1 Couchbase Server 2022-06-22 5.0 MEDIUM 7.5 HIGH
Couchbase Server 5.x through 7.x before 7.0.4 exposes Sensitive Information to an Unauthorized Actor.
CVE-2022-32565 1 Couchbase 1 Couchbase Server 2022-06-22 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Couchbase Server before 7.0.4. The Backup Service log leaks unredacted usernames and document ids.
CVE-2022-32562 1 Couchbase 1 Couchbase Server 2022-06-22 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Couchbase Server before 7.0.4. Operations may succeed on a collection using stale RBAC permission.
CVE-2022-32558 1 Couchbase 1 Couchbase Server 2022-06-22 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Couchbase Server before 7.0.4. Sample bucket loading may leak internal user passwords during a failure.
CVE-2021-42763 1 Couchbase 1 Couchbase Server 2021-11-08 5.0 MEDIUM 7.5 HIGH
Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the "@" user credentials of the node processing the UI request.
CVE-2021-37842 1 Couchbase 1 Couchbase Server 2021-11-08 5.0 MEDIUM 7.5 HIGH
metakv in Couchbase Server 7.0.0 uses Cleartext for Storage of Sensitive Information. Remote Cluster XDCR credentials can get leaked in debug logs. Config key tombstone purging was added in Couchbase Server 7.0.0. This issue happens when a config key, which is being logged, has a tombstone purger time-stamp attached to it.
CVE-2021-35944 1 Couchbase 1 Couchbase Server 2021-10-03 5.0 MEDIUM 7.5 HIGH
Couchbase Server 6.5.x, 6.6.x through 6.6.2, and 7.0.0 has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.
CVE-2021-35945 1 Couchbase 1 Couchbase Server 2021-10-03 5.0 MEDIUM 7.5 HIGH
Couchbase Server 6.5.x, 6.6.0 through 6.6.2, and 7.0.0, has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.
CVE-2021-25644 1 Couchbase 1 Couchbase Server 2021-05-25 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Couchbase Server 5.x and 6.x through 6.6.1 and 7.0.0 Beta. Incorrect commands to the REST API can result in leaked authentication information being stored in cleartext in the debug.log and info.log files, and is also shown in the UI visible to administrators.
CVE-2019-11467 1 Couchbase 1 Couchbase Server 2020-08-24 7.8 HIGH 7.5 HIGH
In Couchbase Server 4.6.3 and 5.5.0, secondary indexing encodes the entries to be indexed using collatejson. When index entries contain certain characters like \t, <, >, it caused buffer overrun as encoded string would be much larger than accounted for, causing indexer service to crash and restart. This has been remedied in versions 5.1.2 and 5.5.2 to ensure buffer always grows as needed for any input.
CVE-2020-9041 1 Couchbase 2 Couchbase Server, Sync Gateway 2020-06-11 5.0 MEDIUM 7.5 HIGH
In Couchbase Server 6.0.3 and Couchbase Sync Gateway through 2.7.0, the Cluster management, views, query, and full-text search endpoints are vulnerable to the Slowloris denial-of-service attack because they don't more aggressively terminate slow connections.
CVE-2020-9042 1 Couchbase 1 Couchbase Server 2020-06-11 6.8 MEDIUM 8.8 HIGH
In Couchbase Server 6.0, credentials cached by a browser can be used to perform a CSRF attack if an administrator has used their browser to check the results of a REST API request.
CVE-2018-15728 1 Couchbase 1 Couchbase Server 2019-09-26 9.0 HIGH 8.8 HIGH
Couchbase Server exposed the '/diag/eval' endpoint which by default is available on TCP/8091 and/or TCP/18091. Authenticated users that have 'Full Admin' role assigned could send arbitrary Erlang code to the 'diag/eval' endpoint of the API and the code would subsequently be executed in the underlying operating system with privileges of the user which was used to start Couchbase. Affects Version: 4.0.0, 4.1.2, 4.5.1, 5.0.0, 4.6.5, 5.0.1, 5.1.1, 5.5.0, 5.5.1. Fix Version: 6.0.0, 5.5.2
CVE-2019-11497 1 Couchbase 1 Couchbase Server 2019-09-26 5.0 MEDIUM 7.5 HIGH
In Couchbase Server 5.0.0, when an invalid Remote Cluster Certificate was entered as part of the reference creation, XDCR did not parse and check the certificate signature. It then accepted the invalid certificate and attempted to use it to establish future connections to the remote cluster. This has been fixed in version 5.5.0. XDCR now checks the validity of the certificate thoroughly and prevents a remote cluster reference from being created with an invalid certificate.