Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:couchbase:couchbase_server:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "467A5F09-0E97-4BA8-933A-14F819D127A7", "vulnerable": true}, {"criteria": "cpe:2.3:a:couchbase:couchbase_server:7.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "930EF10B-3A95-4583-8DE1-84434C62A2E2", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "metakv in Couchbase Server 7.0.0 uses Cleartext for Storage of Sensitive Information. Remote Cluster XDCR credentials can get leaked in debug logs. Config key tombstone purging was added in Couchbase Server 7.0.0. This issue happens when a config key, which is being logged, has a tombstone purger time-stamp attached to it."}, {"lang": "es", "value": "metakv en Couchbase Server versi\u00f3n 7.0.0, usa texto sin Cifrar para el almacenamiento de informaci\u00f3n confidencial. Las credenciales de cluster remoto XDCR pueden filtrarse en los registros de depuraci\u00f3n. Se ha a\u00f1adido la purga de claves de configuraci\u00f3n en Couchbase Server versi\u00f3n 7.0.0. Este problema se produce cuando una clave de configuraci\u00f3n, que se est\u00e1 registrando, presenta una marca de tiempo de purga de tumbas adjunta"}], "id": "CVE-2021-37842", "lastModified": "2024-11-21T06:15:57.527", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-11-02T12:15:07.773", "references": [{"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.couchbase.com/alerts"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.couchbase.com/alerts"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-312"}], "source": "nvd@nist.gov", "type": "Primary"}]}