CVE-2022-24706

CRITICAL KEV NUCLEI

Apache Couchdb Erlang RCE

Title source: metasploit

Description

In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.

Exploits (8)

exploitdb WORKING POC
by Konstantin Burov · pythonremotelinux
https://www.exploit-db.com/exploits/50914
nomisec WORKING POC 29 stars
by sadshade · remote
https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit
nomisec WRITEUP 1 stars
by ahmetsabrimert · poc
https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-
nomisec SCANNER
by becrevex · remote
https://github.com/becrevex/CVE-2022-24706
nomisec STUB
by superzerosec · poc
https://github.com/superzerosec/CVE-2022-24706
vulncheck_xdb WORKING POC
remote
https://github.com/hatjwe/CVE-2023-24706
metasploit WORKING POC EXCELLENT
by Milton Valencia (wetw0rk), 1F98D, Konstantin Burov, _sadshade, jheysel-r7 · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_couchdb_erlang_rce.rb

Nuclei Templates (1)

CouchDB Erlang Distribution - Remote Command Execution
CRITICALVERIFIEDby Mzack9999,pussycat0x
Shodan: product:"CouchDB" || product:"couchdb" || cpe:"cpe:2.3:a:apache:couchdb"

Scores

CVSS v3 9.8
EPSS 0.9437
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-08-25
VulnCheck KEV 2022-03-06
InTheWild.io 2022-08-25
ENISA EUVD EUVD-2022-29572
CWE
CWE-1188
Status published
Products (1)
apache/couchdb < 3.2.2
Published Apr 26, 2022
KEV Added Aug 25, 2022
Tracked Since Feb 18, 2026