In Couchbase Server 5.1.1, the cookie used for intra-node communication was not generated securely. Couchbase Server uses erlang:now() to seed the PRNG which results in a small search space for potential random seeds that could then be used to brute force the cookie and execute code against a remote system. This has been fixed in version 6.0.0.

Published : 2019-09-10 18:15 Updated : 2019-09-26 20:15

CVSS Score More info
Score 7.5 / 10
Vendor Product Version URI
Couchbase Couchbase Server 5.1.1 cpe:/a:couchbase:couchbase_server:5.1.1
  1. Couchbase (1) Search CVE
    1. Couchbase Server (1) Search CVE
      1. 5.1.1


ID Name Description Links
CWE-94 Improper Control of Generation of Code ('Code Injection') The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. CVE

History of changes

Date Event
2019-09-26 20:15
2019-09-11 17:52
2019-09-10 18:19