CVE-2019-9039SQL Injection in Couchbase Sync Gateway

CWE-89SQL Injection4 documents4 sources
Severity
9.8CRITICALNVD
EPSS
0.2%
top 59.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 26
Latest updateFeb 15

Description

In Couchbase Sync Gateway 2.1.2, an attacker with access to the Sync Gateway’s public REST API was able to issue additional N1QL statements and extract sensitive data or call arbitrary N1QL functions through the parameters "startkey" and "endkey" on the "_all_docs" endpoint. By issuing nested queries with CPU-intensive operations they may have been able to cause increased resource usage and denial of service conditions. The _all_docs endpoint is not required for Couchbase Mobile replication and

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
SQL Injection in Couchbase Sync Gateway2022-02-15
OSV
SQL Injection in Couchbase Sync Gateway2022-02-15
CVEList
CVE-2019-9039: In Couchbase Sync Gateway 22019-06-26
CVE-2019-9039 — SQL Injection in Couchbase Sync Gateway | cvebase