Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-8742

CWE-2644 documents4 sources
Severity
7.8HIGH
EPSS
0.4%
top 37.07%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 12
Latest updateMay 14

Description

The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service launcher, or CouchDB batch or binary files. A subsequent service or server restart will then run that binary with administrator privilege. This issue affected CouchDB 2.0.0 (Windows platform only) and was addressed in CouchDB…

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

ā–¶NVDapache/couchdb2.0.0
ā–¶CVEListV5apache_software_foundation/apache_couchdb2.0.0 (Windows platform only)

šŸ”“Vulnerability Details

2
GHSA
GHSA-gq4g-cfc7-fgw7: The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation↗2022-05-14
ā–¶
CVEList
CVE-2016-8742: The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation↗2018-02-12
ā–¶

šŸ’„Exploits & PoCs

1
Exploit-DB
Apache CouchDB 2.0.0 - Local Privilege Escalation↗2016-12-05
ā–¶
CVE-2016-8742 (HIGH CVSS 7.8) | The Windows installer that the Apac | cvebase.io