CVE-2020-24719
CRITICALCouchbase Server < 6.6.0 - OS Command Injection
Title source: ruleDescription
Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.
Exploits (1)
metasploit
WORKING POC
GREAT
by Daniel Mende, Milton Valencia (wetw0rk) · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/erlang_cookie_rce.rb
Scores
CVSS v3
9.8
EPSS
0.6267
EPSS Percentile
98.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
couchbase/couchbase_server
6.5.1 - 6.6.0
Published
Nov 12, 2020
Tracked Since
Feb 18, 2026