Skip to content

SQL Injection in Couchbase Sync Gateway

Critical severity GitHub Reviewed Published Feb 15, 2022 to the GitHub Advisory Database • Updated Sep 18, 2023

Package

gomod github.com/couchbase/sync_gateway (Go)

Affected versions

< 2.5.0

Patched versions

2.5.0

Description

The Couchbase Sync Gateway 2.1.2 in combination with a Couchbase Server is affected by a previously undisclosed N1QL-injection vulnerability in the REST API. An attacker with access to the public REST API can insert additional N1QL statements through the parameters ?startkey? and ?endkey? of the ?_all_docs? endpoint.

References

Reviewed May 17, 2021
Published to the GitHub Advisory Database Feb 15, 2022
Last updated Sep 18, 2023

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2019-9039

GHSA ID

GHSA-g622-r636-qfqh

Source code

No known source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.