An issue was discovered in Couchbase Sync Gateway 2.7.0 through 2.8.2. The bucket credentials used to read and write data in Couchbase Server were insecurely being stored in the metadata within sync documents written to the bucket. Users with read access could use these credentials to obtain write access. (This issue does not affect clusters where Sync Gateway is authenticated with X.509 client certificates. This issue also does not affect clusters where shared bucket access is not enabled on Sync Gateway.)
Advisories
Source ID Title
EUVD EUVD EUVD-2021-30825 An issue was discovered in Couchbase Sync Gateway 2.7.0 through 2.8.2. The bucket credentials used to read and write data in Couchbase Server were insecurely being stored in the metadata within sync documents written to the bucket. Users with read access could use these credentials to obtain write access. (This issue does not affect clusters where Sync Gateway is authenticated with X.509 client certificates. This issue also does not affect clusters where shared bucket access is not enabled on Sync Gateway.)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T04:10:17.137Z

Reserved: 2021-11-17T00:00:00

Link: CVE-2021-43963

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-07T22:15:07.070

Modified: 2024-11-21T06:30:05.927

Link: CVE-2021-43963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.