
Cloud Vulnerability DB
A community-led vulnerabilities database
Couchbase Server before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2 exposed Sensitive Information to an Unauthorized Actor. During a node join failure, unredacted credentials of the user making the REST request could be leaked into the log files (CVE, NVD).
The vulnerability is related to credential exposure during node join operations. When a node join operation fails, the system would inadvertently log unredacted user credentials that were used in the REST request to the log files. This represents a medium severity issue with a CVSS score of 6.3 (Couchbase Alerts).
If exploited, this vulnerability could allow unauthorized actors to access sensitive credential information from log files. This exposure could potentially lead to unauthorized access to the system if the compromised credentials are still valid (Couchbase Alerts).
The issue has been fixed in Couchbase Server versions 7.1.2, 7.0.5, and 6.6.6. Users running affected versions should upgrade to these patched versions to prevent credential exposure (Couchbase Alerts).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."