cve-2021-42763
Vulnerability from cvelistv5
Published
2021-11-02 11:46
Modified
2024-08-04 03:38
Severity ?
EPSS score ?
Summary
Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the "@" user credentials of the node processing the UI request.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.couchbase.com/server/current/release-notes/relnotes.html | Release Notes, Vendor Advisory | |
cve@mitre.org | https://www.couchbase.com/alerts | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.couchbase.com/server/current/release-notes/relnotes.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.couchbase.com/alerts | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:50.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.couchbase.com/alerts" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the \"@\" user credentials of the node processing the UI request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-02T11:46:24", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.couchbase.com/alerts" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the \"@\" user credentials of the node processing the UI request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", "refsource": "MISC", "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html" }, { "name": "https://www.couchbase.com/alerts", "refsource": "MISC", "url": "https://www.couchbase.com/alerts" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42763", "datePublished": "2021-11-02T11:46:24", "dateReserved": "2021-10-20T00:00:00", "dateUpdated": "2024-08-04T03:38:50.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.6.0\", \"matchCriteriaId\": \"822D5705-403C-42B6-A7F4-F1B96DCDA2F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.0.0\", \"versionEndExcluding\": \"6.1.0\", \"matchCriteriaId\": \"3178055C-9670-4D79-932A-07F139F5F922\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.5.0\", \"versionEndIncluding\": \"6.6.2\", \"matchCriteriaId\": \"D7C23D79-2B15-45A5-B5FB-DB0354A108D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:couchbase:couchbase_server:7.0.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"467A5F09-0E97-4BA8-933A-14F819D127A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:couchbase:couchbase_server:7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDBFEB5B-7BF8-456B-84A2-8A8656470F6A\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the \\\"@\\\" user credentials of the node processing the UI request.\"}, {\"lang\": \"es\", \"value\": \"Couchbase Server versiones anteriores a 6.6.3 y 7.x anteriores a 7.0.2, almacena informaci\\u00f3n confidencial en texto sin cifrar. El problema se produce cuando el administrador de cl\\u00fasteres reenv\\u00eda una petici\\u00f3n HTTP desde la UI pluggable (query workbench, etc.) al servicio espec\\u00edfico. En el backtrace, el Basic Auth Header incluido en la petici\\u00f3n HTTP, presenta las credenciales de usuario \\\"@\\\" del nodo que procesa la petici\\u00f3n de UI\"}]", "id": "CVE-2021-42763", "lastModified": "2024-11-21T06:28:07.490", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2021-11-02T12:15:07.837", "references": "[{\"url\": \"https://docs.couchbase.com/server/current/release-notes/relnotes.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://www.couchbase.com/alerts\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://docs.couchbase.com/server/current/release-notes/relnotes.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://www.couchbase.com/alerts\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-312\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2021-42763\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-11-02T12:15:07.837\",\"lastModified\":\"2024-11-21T06:28:07.490\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the \\\"@\\\" user credentials of the node processing the UI request.\"},{\"lang\":\"es\",\"value\":\"Couchbase Server versiones anteriores a 6.6.3 y 7.x anteriores a 7.0.2, almacena informaci\u00f3n confidencial en texto sin cifrar. El problema se produce cuando el administrador de cl\u00fasteres reenv\u00eda una petici\u00f3n HTTP desde la UI pluggable (query workbench, etc.) al servicio espec\u00edfico. En el backtrace, el Basic Auth Header incluido en la petici\u00f3n HTTP, presenta las credenciales de usuario \\\"@\\\" del nodo que procesa la petici\u00f3n de UI\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.6.0\",\"matchCriteriaId\":\"822D5705-403C-42B6-A7F4-F1B96DCDA2F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"6.1.0\",\"matchCriteriaId\":\"3178055C-9670-4D79-932A-07F139F5F922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.0\",\"versionEndIncluding\":\"6.6.2\",\"matchCriteriaId\":\"D7C23D79-2B15-45A5-B5FB-DB0354A108D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:couchbase:couchbase_server:7.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"467A5F09-0E97-4BA8-933A-14F819D127A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:couchbase:couchbase_server:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDBFEB5B-7BF8-456B-84A2-8A8656470F6A\"}]}]}],\"references\":[{\"url\":\"https://docs.couchbase.com/server/current/release-notes/relnotes.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.couchbase.com/alerts\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://docs.couchbase.com/server/current/release-notes/relnotes.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.couchbase.com/alerts\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.