{"id":"UBUNTU-CVE-2022-36640","details":"** DISPUTED ** influxData influxDB before v1.8.10 contains no authentication mechanism or controls, allowing unauthenticated attackers to execute arbitrary commands. NOTE: the CVE ID assignment is disputed because the vendor's documentation states \"If InfluxDB is being deployed on a publicly accessible endpoint, we strongly recommend authentication be enabled. Otherwise the data will be publicly available to any unauthenticated user. The default settings do NOT enable authentication and authorization.\"","modified":"2022-09-02T21:15:00Z","published":"2022-09-02T21:15:00Z","withdrawn":"2025-06-23T15:55:04Z","references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36640"},{"type":"REPORT","url":"https://portal.influxdata.com/downloads/"},{"type":"REPORT","url":"http://www.krsecu.com/CVE/409b5310045bd6b9a984a5fb63bd8786d5c5681a8ad5b1c815c84b2b90002ad7.docx"},{"type":"REPORT","url":"http://influxdb.com"},{"type":"REPORT","url":"http://influxdata.com"},{"type":"REPORT","url":"https://dl.influxdata.com/influxdb/releases/influxdb_1.8.10_amd64.deb"},{"type":"REPORT","url":"https://www.influxdata.com/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-36640"}],"affected":[{"package":{"name":"influxdb","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/influxdb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.9.4+dfsg1-1","0.9.6.1+dfsg1-3","0.10.0+dfsg1-1"],"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-36640.json"}},{"package":{"name":"influxdb","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/influxdb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.1+dfsg1-4","1.1.1+dfsg1-4+deb9u1ubuntu1"],"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-36640.json"}},{"package":{"name":"influxdb","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/influxdb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.6.4-1build1","1.6.4-1+deb10u1build0.20.04.1","1.6.4-1+deb10u1ubuntu0.1","1.6.4-1+deb10u1ubuntu0.2"],"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-36640.json"}},{"package":{"name":"influxdb","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/influxdb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.6.7~rc0-1","1.6.7~rc0-1ubuntu0.22.04.1","1.6.7~rc0-1ubuntu0.22.04.2"],"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-36640.json"}},{"package":{"name":"influxdb","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/influxdb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.6.7~rc0-2build1","1.6.7~rc0-2ubuntu0.24.04.1"],"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-36640.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}