Apache CouchDB < 1.0.2 Futon Admin Interface XSS

Medium Nessus Plugin ID 51923


The remote database server is affected by a cross-site scripting vulnerability.


According to its banner, the version of CouchDB running on the remote host is affected by a cross-site scripting vulnerability. The application fails to properly sanitize user-supplied input before it is used in the Futon admin interface.

A remote attacker could exploit this to execute arbitrary script code in the security context of CouchDB's admin interface.

Note that Nessus did not actually test for the flaw but instead has relied on the version in CouchDB's banner so this may be a false positive.


Upgrade to CouchDB 1.0.2 or later.

See Also


Plugin Details

Severity: Medium

ID: 51923

File Name: couchdb_1_0_2.nasl

Version: 1.10

Type: remote

Family: Databases

Published: 2011/02/09

Updated: 2018/07/06

Dependencies: 51922

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apache:couchdb

Required KB Items: Settings/ParanoidReport, www/couchdb

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/01/27

Vulnerability Publication Date: 2011/01/28

Reference Information

CVE: CVE-2010-3854

BID: 46066

Secunia: 43111

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990