CVE-2017-12636

HIGH LAB

Apache Couchdb < 1.7.0 - OS Command Injection

Title source: rule

Description

CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/45019
exploitdb WORKING POC VERIFIED
by Cody Zacharias · pythonwebappslinux
https://www.exploit-db.com/exploits/44913
nomisec WORKING POC 6 stars
by XTeam-Wing · poc
https://github.com/XTeam-Wing/CVE-2017-12636
nomisec WORKING POC 3 stars
by moayadalmalat · poc
https://github.com/moayadalmalat/CVE-2017-12636
metasploit WORKING POC EXCELLENT
by Max Justicz, Joan Touzet · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/apache_couchdb_cmd_exec.rb
inthewild WORKING POC
poc
https://github.com/redteamwing/cve-2017-12636

Scores

CVSS v3 7.2
EPSS 0.9375
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (4)
apache/couchdb 2.0.0 (5 CPE variants)
apache/couchdb < 1.7.0
Apache Software Foundation/Apache CouchDB 1.2.0 to 1.6.1
Apache Software Foundation/Apache CouchDB 2.0.0 to 2.1.0
Published Nov 14, 2017
Tracked Since Feb 18, 2026