Логотип exploitDog
bind:CVE-2019-9039
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-9039

Количество 2

Количество 2

nvd логотип

CVE-2019-9039

больше 6 лет назад

In Couchbase Sync Gateway 2.1.2, an attacker with access to the Sync Gateway’s public REST API was able to issue additional N1QL statements and extract sensitive data or call arbitrary N1QL functions through the parameters "startkey" and "endkey" on the "_all_docs" endpoint. By issuing nested queries with CPU-intensive operations they may have been able to cause increased resource usage and denial of service conditions. The _all_docs endpoint is not required for Couchbase Mobile replication and external access to this REST endpoint has been blocked to mitigate this issue. This issue has been fixed in versions 2.5.0 and 2.1.3.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-g622-r636-qfqh

почти 4 года назад

SQL Injection in Couchbase Sync Gateway

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-9039

In Couchbase Sync Gateway 2.1.2, an attacker with access to the Sync Gateway’s public REST API was able to issue additional N1QL statements and extract sensitive data or call arbitrary N1QL functions through the parameters "startkey" and "endkey" on the "_all_docs" endpoint. By issuing nested queries with CPU-intensive operations they may have been able to cause increased resource usage and denial of service conditions. The _all_docs endpoint is not required for Couchbase Mobile replication and external access to this REST endpoint has been blocked to mitigate this issue. This issue has been fixed in versions 2.5.0 and 2.1.3.

CVSS3: 9.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-g622-r636-qfqh

SQL Injection in Couchbase Sync Gateway

CVSS3: 9.8
0%
Низкий
почти 4 года назад

Уязвимостей на страницу