This Metasploit module enumerates databases on CouchDB using the REST API (without authentication by default).
2942d69e8cd376e67d7cb3531714d06e9b22d6dd3d9fe3f3f432e8930a09dad3
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
a93f10ff77a858d80ea8ceaf2de3218d932d08cd6154f36a815a8470659052df
Apache CouchDB versions 1.7.0 and 2.x before 2.1.1 suffer from a remote privilege escalation vulnerability.
525d67ae1bd8cce85c38aefe50c57f261d94efb9be445529a511817757bd7d95
Gentoo Linux Security Advisory 201711-16 - Multiple vulnerabilities have been found in CouchDB, the worst of which could lead to the remote execution of arbitrary shell commands. Versions less than 1.7.1 are affected.
1637e4fbe6d399b8b711ad956330ad1c1baaed2b7f7cef8cb47f94e57500c620