Apache CouchDB < 3.2.2 Remote Privilege Escalation

critical Nessus Plugin ID 161177


The remote database server is potentially affected by a privilege escalation vulnerability.


According to its banner, the version of CouchDB running on the remote host is prior to 3.2.2 It is, therefore, potentially affected by a remote privilege escalation vulnerability. An attacker can access an improperly secured default installation without authenticating and gain admin privileges.

Note that Nessus did not actually test for these flaws but instead, has relied on the version in CouchDB's banner.


Upgrade to CouchDB 3.2.2 or later.

See Also


Plugin Details

Severity: Critical

ID: 161177

File Name: couchdb_3_2_2.nasl

Version: 1.6

Type: remote

Family: Databases

Published: 5/13/2022

Updated: 5/4/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 8.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-24706


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:couchdb

Required KB Items: Settings/ParanoidReport, www/couchdb

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/25/2022

Vulnerability Publication Date: 4/25/2022

CISA Known Exploited Vulnerability Due Dates: 9/15/2022

Exploitable With


Core Impact

Metasploit (Apache Couchdb Erlang RCE)

Reference Information

CVE: CVE-2022-24706

IAVB: 2022-B-0012-S