You are receiving this message because you signed up for the Neighbourhoodie CouchDB News. This special edition outlines Neighbourhoodie’s recommendations for customers operating CouchDB with regards to CVE 2023-26268.
Occasionally, the CouchDB team releases a new version release and announces that a certain security vulnerability has been addressed. In these cases, Neighbourhoodie issues a guidance document like this that helps customers to understand the impact the security vulnerability has on their operation of CouchDB.
The security vulnerability concerns the application of JavaScript functions inside of CouchDB’s design docs feature. By design, these JavaScript functions are run in isolation without any knowledge of anything but their direct parameter input.
Under certain circumstances (outlined below), it is possible for one such function to access data left in a couchjs
process by another function. With this it is theoretically possible to access data from a database that a requesting user has no access to.
The possibility for this is very rare. It can only happen, if:
_design
documents,validate_doc_update
, list
, filter
, filter_views
(map
), rewrite
or update
function,_design
documents in those separate databases have the same document _id
,_design
document with the same document _id
from two different databases before being recycled.In Neighbourhoodie’s estimation, this is a very rare scenario. The CouchDB security team agrees by assigning this CVE a medium severity.
If all of the five requirements apply to your setup, we recommend you upgrade to the latest CouchDB versions for your release line (3.3.2 or 3.2.3).
If one of the requirements 1–4 do not apply to your setup, you have nothing to worry about.
If you have any questions or feedback about any of this and you are under a Neighbourhoodie CouchDB Support contract, you can always get in touch at couchdb@neighbourhood.ie.
If you are interested in signing up for a Neighbourhoodie CouchDB Support contract, contact sales@neighbourhood.ie.