Couchbase Server 5.5.0

CPE Details

Couchbase Server 5.5.0
5.5.0
2019-09-11
15h33 +00:00
2019-09-11
15h33 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:couchbase:couchbase_server:5.5.0:*:*:*:*:*:*:*

Informations

Vendor

couchbase

Product

couchbase_server

Version

5.5.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-25673 2024-09-18 22h00 +00:00 Couchbase Server 7.6.x before 7.6.2, 7.2.x before 7.2.6, and all earlier versions allows HTTP Host header injection.
6.1
Medium
CVE-2024-23302 2024-02-27 23h00 +00:00 Couchbase Server before 7.2.4 has a private key leak in goxdcr.log.
7.5
High
CVE-2024-0519 2024-01-16 21h14 +00:00 Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
8.8
High
CVE-2023-36667 2023-11-07 23h00 +00:00 Couchbase Server 7.1.4 before 7.1.5 and 7.2.0 before 7.2.1 allows Directory Traversal.
7.5
High
CVE-2023-3079 2023-06-05 21h40 +00:00 Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
8.8
High
CVE-2023-2033 2023-04-14 18h10 +00:00 Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
8.8
High
CVE-2023-25016 2023-02-05 23h00 +00:00 Couchbase Server before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2 exposes Sensitive Information to an Unauthorized Actor.
7.5
High
CVE-2022-32556 2022-07-21 09h26 +00:00 An issue was discovered in Couchbase Server before 7.0.4. A private key is leaked to the log files with certain crashes.
7.5
High
CVE-2022-32559 2022-06-14 14h38 +00:00 An issue was discovered in Couchbase Server before 7.0.4. Random HTTP requests lead to leaked metrics.
9.1
Critical
CVE-2022-32557 2022-06-14 14h38 +00:00 An issue was discovered in Couchbase Server before 7.0.4. The Index Service does not enforce authentication for TCP/TLS servers.
7.5
High
CVE-2022-32561 2022-06-14 14h38 +00:00 An issue was discovered in Couchbase Server before 6.6.5 and 7.x before 7.0.4. Previous mitigations for CVE-2018-15728 were found to be insufficient when it was discovered that diagnostic endpoints could still be accessed from the network.
4.9
Medium
CVE-2022-32192 2022-06-13 20h15 +00:00 Couchbase Server 5.x through 7.x before 7.0.4 exposes Sensitive Information to an Unauthorized Actor.
7.5
High
CVE-2022-32560 2022-06-13 18h45 +00:00 An issue was discovered in Couchbase Server before 7.0.4. XDCR lacks role checking when changing internal settings.
7.5
High
CVE-2022-32564 2022-06-13 18h45 +00:00 An issue was discovered in Couchbase Server before 7.0.4. In couchbase-cli, server-eshell leaks the Cluster Manager cookie.
7.5
High
CVE-2021-33504 2022-05-31 18h29 +00:00 Couchbase Server before 7.1.0 has Incorrect Access Control.
4.9
Medium
CVE-2021-42763 2021-11-02 10h46 +00:00 Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the "@" user credentials of the node processing the UI request.
7.5
High
CVE-2021-35945 2021-09-29 17h11 +00:00 Couchbase Server 6.5.x, 6.6.0 through 6.6.2, and 7.0.0, has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.
7.5
High
CVE-2021-25643 2021-05-26 18h09 +00:00 An issue was discovered in Couchbase Server 5.x and 6.x before 6.5.2 and 6.6.x before 6.6.2. Internal users with administrator privileges, @cbq-engine-cbauth and @index-cbauth, leak credentials in cleartext in the indexer.log file when they make a /listCreateTokens, /listRebalanceTokens, or /listMetadataTokens call.
4.9
Medium
CVE-2021-25644 2021-05-19 16h50 +00:00 An issue was discovered in Couchbase Server 5.x and 6.x through 6.6.1 and 7.0.0 Beta. Incorrect commands to the REST API can result in leaked authentication information being stored in cleartext in the debug.log and info.log files, and is also shown in the UI visible to administrators.
7.5
High
CVE-2021-25645 2021-05-10 10h59 +00:00 An issue was discovered in Couchbase Server before 6.0.5, 6.1.x through 6.5.x before 6.5.2, and 6.6.x before 6.6.1. An internal user with administrator privileges, @ns_server, leaks credentials in cleartext in the cbcollect_info.log, debug.log, ns_couchdb.log, indexer.log, and stats.log files. NOTE: updating the product does not automatically address leaks that occurred in the past.
4.4
Medium
CVE-2020-9039 2020-02-22 00h30 +00:00 Couchbase Server 4.0.0, 4.1.0, 4.1.1, 4.5.0, 4.5.1, 4.6.0 through 4.6.5, 5.0.0, 5.1.1, 5.5.0 and 5.5.1 have Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).The /settings REST endpoint exposed by the projector process is an endpoint that administrators can use for various tasks such as updating configuration and collecting performance profiles. The endpoint was unauthenticated and has been updated to only allow authenticated users to access these administrative APIs.
9.8
Critical
CVE-2019-11467 2019-09-10 15h21 +00:00 In Couchbase Server 4.6.3 and 5.5.0, secondary indexing encodes the entries to be indexed using collatejson. When index entries contain certain characters like \t, <, >, it caused buffer overrun as encoded string would be much larger than accounted for, causing indexer service to crash and restart. This has been remedied in versions 5.1.2 and 5.5.2 to ensure buffer always grows as needed for any input.
7.5
High
CVE-2019-11466 2019-09-10 15h02 +00:00 In Couchbase Server 6.0.0 and 5.5.0, the eventing service exposes system diagnostic profile via an HTTP endpoint that does not require credentials on a port earmarked for internal traffic only. This has been remedied in version 6.0.1 and now requires valid credentials to access.
5.3
Medium
CVE-2019-11465 2019-09-10 14h55 +00:00 An issue was discovered in Couchbase Server 5.5.x through 5.5.3 and 6.0.0. The Memcached "connections" stat block command emits a non-redacted username. The system information submitted to Couchbase as part of a bug report included the usernames for all users currently logged into the system even if the log was redacted for privacy. This has been fixed (in 5.5.4 and 6.0.1) so that usernames are tagged properly in the logs and are hashed out when the logs are redacted.
5.3
Medium
CVE-2019-11464 2019-09-10 14h38 +00:00 Some enterprises require that REST API endpoints include security-related headers in REST responses. Headers such as X-Frame-Options and X-Content-Type-Options are generally advisable, however some information security professionals additionally look for X-Permitted-Cross-Domain-Policies and X-XSS-Protection, which are more generally applicable to HTML endpoint, to be included too. These headers were not included in Couchbase Server 5.5.0 and 5.1.2 . They are now included in version 6.0.2 in responses from the Couchbase Server Views REST API (port 8092).
6.1
Medium