{"api_version":"1","generated_at":"2026-05-06T18:53:32+00:00","cve":"CVE-2022-24706","urls":{"html":"https://cve.report/CVE-2022-24706","api":"https://cve.report/api/cve/CVE-2022-24706.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24706","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24706"},"summary":{"title":"CVE-2022-24706","description":"In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2022-04-26 10:15:00","updated_at":"2023-11-07 03:44:00"},"problem_types":["CWE-1188"],"metrics":[],"references":[{"url":"http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html","refsource":"MISC","tags":[],"title":"Apache CouchDB Erlang Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://docs.couchdb.org/en/3.2.2/setup/cluster.html","name":"https://docs.couchdb.org/en/3.2.2/setup/cluster.html","refsource":"MISC","tags":[],"title":"2.2. Cluster Set Up — Apache CouchDB® 3.2 Documentation","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/05/09/3","name":"[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE-2022-24706: Apache CouchDB: Remote Code\n Execution Vulnerability in Packaging","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/04/26/1","name":"[oss-security] 20220426 CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","refsource":"MLIST","tags":[],"title":"oss-security - CVE-2022-24706: Apache CouchDB: Remote Code Execution\n Vulnerability in Packaging","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html","refsource":"MISC","tags":[],"title":"Apache CouchDB 3.2.1 Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00","name":"https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://medium.com/%40_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd","name":"https://medium.com/%40_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd","refsource":"","tags":[],"title":"CouchDB, Erlang and cookies — RCE on default settings | by Konstantin Burov | Medium","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2022/05/09/4","name":"[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE-2022-24706: Apache CouchDB: Remote Code\n Execution Vulnerability in Packaging","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/05/09/1","name":"[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE-2022-24706: Apache CouchDB: Remote Code\n Execution Vulnerability in Packaging","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd","name":"https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd","refsource":"MISC","tags":[],"title":"CouchDB, Erlang and cookies — RCE on default settings | by Konstantin Burov | Medium","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2022/05/09/2","name":"[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE-2022-24706: Apache CouchDB: Remote Code\n Execution Vulnerability in Packaging","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24706","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24706","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"The Apache CouchDB Team would like to thank Alex Vandiver <alexmv@zulip.com> for the report of this issue.","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"24706","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"couchdb","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2022","cve_id":"24706","cve":"CVE-2022-24706","vendorProject":"Apache","product":"CouchDB","vulnerabilityName":"Apache CouchDB Insecure Default Initialization of Resource Vulnerability","dateAdded":"2022-08-25","shortDescription":"Apache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-09-15","knownRansomwareCampaignUse":"Unknown","notes":"https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00;  https://nvd.nist.gov/vuln/detail/CVE-2022-24706","cwes":"CWE-1188","catalogVersion":"2026.05.06","updated_at":"2026-05-06 17:58:36"},"epss":{"cve_year":"2022","cve_id":"24706","cve":"CVE-2022-24706","epss":"0.943690000","percentile":"0.999660000","score_date":"2026-05-05","updated_at":"2026-05-06 00:08:11"},"legacy_qids":[{"cve":"CVE-2022-24706","qid":"730467","title":"Apache CouchDB Remote Privilege Escalation Vulnerability"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2022-24706","STATE":"PUBLIC","TITLE":"Remote Code Execution Vulnerability in Packaging"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache CouchDB","version":{"version_data":[{"version_affected":"<=","version_name":"Apache CouchDB","version_value":"3.2.1"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"credit":[{"lang":"eng","value":"The Apache CouchDB Team would like to thank Alex Vandiver <alexmv@zulip.com> for the report of this issue."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":[{"other":"critical"}],"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-1188 Insecure Default Initialization of Resource"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00","name":"https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00"},{"refsource":"MISC","url":"https://docs.couchdb.org/en/3.2.2/setup/cluster.html","name":"https://docs.couchdb.org/en/3.2.2/setup/cluster.html"},{"refsource":"MLIST","name":"[oss-security] 20220426 CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","url":"http://www.openwall.com/lists/oss-security/2022/04/26/1"},{"refsource":"MLIST","name":"[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","url":"http://www.openwall.com/lists/oss-security/2022/05/09/1"},{"refsource":"MLIST","name":"[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","url":"http://www.openwall.com/lists/oss-security/2022/05/09/3"},{"refsource":"MLIST","name":"[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","url":"http://www.openwall.com/lists/oss-security/2022/05/09/4"},{"refsource":"MLIST","name":"[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging","url":"http://www.openwall.com/lists/oss-security/2022/05/09/2"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html","url":"http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html"},{"refsource":"MISC","name":"https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd","url":"https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html","url":"http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html"}]},"source":{"discovery":"UNKNOWN"},"work_around":[{"lang":"eng","value":"CouchDB 3.2.2 and onwards will refuse to start with the former default\nErlang cookie value of `monster`. Installations that upgrade to this\nversions are forced to choose a different value.\n\nIn addition, all binary packages have been updated to bind `epmd` as\nwell as the CouchDB distribution port to `127.0.0.1` and/or `::1`\nrespectively."}]},"nvd":{"publishedDate":"2022-04-26 10:15:00","lastModifiedDate":"2023-11-07 03:44:00","problem_types":["CWE-1188"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*","versionEndExcluding":"3.2.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24706","Ordinal":"228129","Title":"CVE-2022-24706","CVE":"CVE-2022-24706","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24706","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}