CVE-2022-24706
CRITICAL KEV NUCLEIApache Couchdb Erlang RCE
Title source: metasploitDescription
In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
Exploits (8)
exploitdb
WORKING POC
by Konstantin Burov · pythonremotelinux
https://www.exploit-db.com/exploits/50914
nomisec
WORKING POC
29 stars
by sadshade · remote
https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit
nomisec
WRITEUP
1 stars
by ahmetsabrimert · poc
https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-
metasploit
WORKING POC
EXCELLENT
by Milton Valencia (wetw0rk), 1F98D, Konstantin Burov, _sadshade, jheysel-r7 · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_couchdb_erlang_rce.rb
Nuclei Templates (1)
CouchDB Erlang Distribution - Remote Command Execution
CRITICALVERIFIEDby Mzack9999,pussycat0x
Shodan:
product:"CouchDB" || product:"couchdb" || cpe:"cpe:2.3:a:apache:couchdb"
References (11)
Scores
CVSS v3
9.8
EPSS
0.9437
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-08-25
VulnCheck KEV
2022-03-06
InTheWild.io
2022-08-25
ENISA EUVD
EUVD-2022-29572
CWE
CWE-1188
Status
published
Products (1)
apache/couchdb
< 3.2.2
Published
Apr 26, 2022
KEV Added
Aug 25, 2022
Tracked Since
Feb 18, 2026