CouchDB - Port 5984,6984
Basic info
Field
Meaning
Default Ports
Port
Protocol
Purpose
Automatic Enumeration
Nmap
Metasploit
Manual Enumeration (Must-Know for Real Pentesters)
Check if CouchDB is reachable
High-Value Endpoints Hackers Should Always Check
Endpoint
What It Reveals
Extracting Databases, Documents & Credentials
List databases
Show DB metadata
List documents
Read a document
Exploitation Techniques
CVE-2017-12635 — Create an Admin User Without Authentication
🧠 Why it works
Exploit:
CVE-2018-8007 — RCE via local.ini write injection (OS Daemons)
CVE-2017-12636 — RCE via malicious query server definitions
Erlang Cookie RCE (Not a CVE — but extremely real)
Practical Real-World Attack Chains
Attack Chain 1:
Unauthenticated CouchDB + Exposed _all_dbs → Secrets → Lateral Movement
Attack Chain 2:
CVE-2017-12635 Admin Creation → Query Server RCE → Reverse Shell
Attack Chain 3:
Misconfigured local.ini → CouchDB Daemon Injection (CVE-2018-8007) → Privilege escalation
Attack Chain 4:
Erlang Cookie Leakage → Cluster Takeover
Defending CouchDB (What Blue Teams Must Fix)
Cheat Sheet Summary for Pentesters
Enumeration
CVE-2017-12635 Admin Creation
CVE-2017-12636 / Query Server RCE
CVE-2018-8007 OS Daemon Injection
Erlang Cookie RCE
Last updated