CouchDB - Port 5984,6984
Basic info
Field
Meaning
Default Ports
Port
Protocol
Purpose
Automatic Enumeration
Nmap
Metasploit
Manual Enumeration (Must-Know for Real Pentesters)
Check if CouchDB is reachable
High-Value Endpoints Hackers Should Always Check
Endpoint
What It Reveals
Extracting Databases, Documents & Credentials
List databases
Show DB metadata
List documents
Read a document
Exploitation Techniques
CVE-2017-12635 β Create an Admin User Without Authentication
π§ Why it works
Exploit:
CVE-2018-8007 β RCE via local.ini write injection (OS Daemons)
CVE-2017-12636 β RCE via malicious query server definitions
Erlang Cookie RCE (Not a CVE β but extremely real)
Practical Real-World Attack Chains
Attack Chain 1:
Unauthenticated CouchDB + Exposed _all_dbs β Secrets β Lateral Movement
Attack Chain 2:
CVE-2017-12635 Admin Creation β Query Server RCE β Reverse Shell
Attack Chain 3:
Misconfigured local.ini β CouchDB Daemon Injection (CVE-2018-8007) β Privilege escalation
Attack Chain 4:
Erlang Cookie Leakage β Cluster Takeover
Defending CouchDB (What Blue Teams Must Fix)
Cheat Sheet Summary for Pentesters
Enumeration
CVE-2017-12635 Admin Creation
CVE-2017-12636 / Query Server RCE
CVE-2018-8007 OS Daemon Injection
Erlang Cookie RCE
Last updated