ID CVE-2019-11495
Summary In Couchbase Server 5.1.1, the cookie used for intra-node communication was not generated securely. Couchbase Server uses erlang:now() to seed the PRNG which results in a small search space for potential random seeds that could then be used to brute force the cookie and execute code against a remote system. This has been fixed in version 6.0.0.
References
Vulnerable Configurations
  • cpe:2.3:a:couchbase:couchbase_server:5.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:couchbase:couchbase_server:5.1.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 10-02-2024 - 02:54)
Impact:
Exploitability:
CWE CWE-335
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
misc https://www.couchbase.com/resources/security#SecurityAlerts
Last major update 10-02-2024 - 02:54
Published 10-09-2019 - 18:15
Last modified 10-02-2024 - 02:54
Back to Top