Apache CouchDB < 0.11.2 Futon admin interface Cross-Site Request Forgery

Medium Nessus Plugin ID 48382


The remote database server is affected by a cross-site request forgery vulnerability.


According to its banner, the version of CouchDB running on the remote host is affected by a cross-site request forgery vulnerability. The application fails to properly sanitize user-supplied input before it is used in the Futon admin interface.

A remote attacker could exploit this to execute arbitrary script code in the security context of CouchDB's admin interface.


Upgrade to CouchDB 0.11.2 or later.

See Also


Plugin Details

Severity: Medium

ID: 48382

File Name: couchdb_0_11_2.nasl

Version: 1.13

Type: remote

Family: Databases

Published: 2010/08/20

Updated: 2018/11/15

Dependencies: 51922

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apache:couchdb

Required KB Items: Settings/ParanoidReport, www/couchdb

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/08/17

Vulnerability Publication Date: 2010/08/17

Reference Information

CVE: CVE-2010-2234

BID: 42501

Secunia: 40998