diff --git a/Apache CouchDB/CVE-2022-24706/Apache_CouchDB_Unauthenticated_Remote_Code_Execution_Vulnerability.gif b/Apache CouchDB/CVE-2022-24706/Apache_CouchDB_Unauthenticated_Remote_Code_Execution_Vulnerability.gif new file mode 100644 index 0000000..b611410 Binary files /dev/null and b/Apache CouchDB/CVE-2022-24706/Apache_CouchDB_Unauthenticated_Remote_Code_Execution_Vulnerability.gif differ diff --git a/Apache CouchDB/CVE-2022-24706/README.md b/Apache CouchDB/CVE-2022-24706/README.md new file mode 100644 index 0000000..8fd6af4 --- /dev/null +++ b/Apache CouchDB/CVE-2022-24706/README.md @@ -0,0 +1,10 @@ + +# Apache CouchDB Unauthenticated Remote Code Execution Vulnerability (CVE-2022-24706) + +Apache CouchDB is a document-oriented database system developed by the Apache Foundation using Erlang.An access control error vulnerability existed prior to Apache CouchDB 3.2.2 that stemmed from the ability of an attacker to access an incorrect default installation and gain administrator privileges without authenticating. + +FOFA **query rule**: [banner="name couchdb at"](https://fofa.info/result?qbase64=YmFubmVyPSJuYW1lIGNvdWNoZGIgYXQi) + +# Demo + +![Apache_CouchDB_Unauthenticated_Remote_Code_Execution_Vulnerability](Apache_CouchDB_Unauthenticated_Remote_Code_Execution_Vulnerability.gif)