Summary
Detail | |||
---|---|---|---|
Vendor | Mongodb | First view | 2013-08-15 |
Product | Mongodb | Last view | 2024-10-21 |
Version | 2.0.6 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:mongodb:mongodb |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2024-10-21 | CVE-2024-8305 | prepareUnique index may cause secondaries to crash due to incorrect enforcement of index constraints on secondaries, where in extreme cases may cause multiple secondaries crashing leading to no primaries. This issue affects MongoDB Server v6.0 versions prior to 6.0.17, MongoDB Server v7.0 versions prior to 7.0.13 and MongoDB Server v7.3 versions prior to 7.3.4 |
6.7 | 2024-08-27 | CVE-2024-8207 | In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3. Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue |
5.3 | 2024-08-13 | CVE-2024-6384 | "Hot" backup files may be downloaded by underprivileged users, if they are capable of acquiring a unique backup identifier. This issue affects MongoDB Enterprise Server v6.0 versions prior to 6.0.16, MongoDB Enterprise Server v7.0 versions prior to 7.0.11 and MongoDB Enterprise Server v7.3 versions prior to 7.3.3 |
7.8 | 2024-08-07 | CVE-2024-7553 | Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1. Required Configuration: Only environments with Windows as the underlying operating system is affected by this issue |
6.5 | 2024-07-01 | CVE-2024-6375 | A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3. |
9.8 | 2024-03-07 | CVE-2024-1351 | Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28. Required Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured. |
7.5 | 2023-08-23 | CVE-2023-1409 | If the MongoDB Server running on Windows or macOS is configured to use TLS with a specific set of configuration options that are already known to work securely in other platforms (e.g. Linux), it is possible that client certificate validation may not be in effect, potentially allowing client to establish a TLS connection with the server that supplies any certificate. This issue affect all MongoDB Server v6.3 versions, MongoDB Server v5.0 versions v5.0.0 to v5.0.14 and all MongoDB Server v4.4 versions. |
6.5 | 2022-04-21 | CVE-2022-24272 | An authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external database. This may result in mongod denial of service or server crash. This issue affects: MongoDB Inc. MongoDB Server v5.0 versions, prior to and including v5.0.6. |
7.5 | 2022-04-12 | CVE-2021-32040 | It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16. Workaround:Â >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash. |
7.1 | 2022-02-04 | CVE-2021-32036 | An authenticated user without any specific authorizations may be able to repeatedly invoke the features command where at a high volume may lead to resource depletion or generate high lock contention. This may result in denial of service and in rare cases could result in id field collisions. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.3; MongoDB Server v4.4 versions prior to and including 4.4.9; MongoDB Server v4.2 versions prior to and including 4.2.16 and MongoDB Server v4.0 versions prior to and including 4.0.28 |
6.5 | 2021-12-15 | CVE-2021-20330 | An attacker with basic CRUD permissions on a replicated collection can run the applyOps command with specially malformed oplog entries, resulting in a potential denial of service on secondaries. This issue affects MongoDB Server v4.0 versions prior to 4.0.27; MongoDB Server v4.2 versions prior to 4.2.16; MongoDB Server v4.4 versions prior to 4.4.9. |
6.5 | 2021-11-24 | CVE-2021-32037 | An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled environment. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.2. |
5.3 | 2021-07-23 | CVE-2021-20333 | Sending specially crafted commands to a MongoDB Server may result in artificial log entries being generated or for log entries to be split. This issue affects MongoDB Server v3.6 versions prior to 3.6.20; MongoDB Server v4.0 versions prior to 4.0.21 and MongoDB Server v4.2 versions prior to 4.2.10. |
6.5 | 2021-04-30 | CVE-2021-20326 | A user authorized to performing a specific type of find query may trigger a denial of service. This issue affects MongoDB Server v4.4 versions prior to 4.4.4. |
6.5 | 2021-03-01 | CVE-2020-7929 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted query contain a type of regex. This issue affects MongoDB Server v3.6 versions prior to 3.6.21 and MongoDB Server v4.0 versions prior to 4.0.20. |
4.9 | 2021-03-01 | CVE-2018-25004 | A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects MongoDB Server v4.0 versions prior to 4.0.6 and MongoDB Server v3.6 versions prior to 3.6.11. |
7.5 | 2020-11-24 | CVE-2019-20925 | An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects MongoDB Server v4.2 versions prior to 4.2.1; MongoDB Server v4.0 versions prior to 4.0.13; MongoDB Server v3.6 versions prior to 3.6.15 and MongoDB Server v3.4 versions prior to 3.4.24. |
6.5 | 2020-11-23 | CVE-2020-7928 | A user authorized to perform database queries may trigger a read overrun and access arbitrary memory by issuing specially crafted queries. This issue affects MongoDB Server v4.4 versions prior to 4.4.1; MongoDB Server v4.2 versions prior to 4.2.9; MongoDB Server v4.0 versions prior to 4.0.20 and MongoDB Server v3.6 versions prior to 3.6.20. |
6.5 | 2020-11-23 | CVE-2020-7926 | A user authorized to perform database queries may cause denial of service by issuing a specially crafted query which violates an invariant in the server selection subsystem. This issue affects MongoDB Server v4.4 versions prior to 4.4.1. Versions before 4.4 are not affected. |
7.5 | 2020-11-23 | CVE-2020-7925 | Incorrect validation of user input in the role name parser may lead to use of uninitialized memory allowing an unauthenticated attacker to use a specially crafted request to cause a denial of service. This issue affects MongoDB Server v4.4 versions prior to 4.4.0-rc12; MongoDB Server v4.2 versions prior to 4.2.9. |
6.5 | 2020-11-23 | CVE-2019-2393 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which use $lookup and collations. This issue affects MongoDB Server v4.2 versions prior to 4.2.1; MongoDB Server v4.0 versions prior to 4.0.13 and MongoDB Server v3.6 versions prior to 3.6.15. |
6.5 | 2020-11-23 | CVE-2019-2392 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which use the $mod operator to overflow negative values. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.1; v4.2 versions prior to 4.2.9; v4.0 versions prior to 4.0.20; v3.6 versions prior to 3.6.20. |
6.5 | 2020-11-23 | CVE-2019-20924 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries which trigger an invariant in the IndexBoundsBuilder. This issue affects MongoDB Server v4.2 versions prior to 4.2.2. |
6.5 | 2020-11-23 | CVE-2019-20923 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which throw unhandled Javascript exceptions containing types intended to be scoped to the Javascript engine's internals. This issue affects MongoDB Server v4.0 versions prior to 4.0.7. |
6.5 | 2020-11-23 | CVE-2018-20805 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which perform an $elemMatch . This issue affects MongoDB Server v4.0 versions prior to 4.0.5 and MongoDB Server v3.6 versions prior to 3.6.10. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
30% (8) | CWE-20 | Improper Input Validation |
7% (2) | CWE-755 | Improper Handling of Exceptional Conditions |
7% (2) | CWE-617 | Reachable Assertion |
7% (2) | CWE-295 | Certificate Issues |
3% (1) | CWE-787 | Out-of-bounds Write |
3% (1) | CWE-770 | Allocation of Resources Without Limits or Throttling |
3% (1) | CWE-754 | Improper Check for Unusual or Exceptional Conditions |
3% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
3% (1) | CWE-697 | Insufficient Comparison |
3% (1) | CWE-613 | Insufficient Session Expiration |
3% (1) | CWE-610 | Externally Controlled Reference to a Resource in Another Sphere |
3% (1) | CWE-416 | Use After Free |
3% (1) | CWE-287 | Improper Authentication |
3% (1) | CWE-200 | Information Exposure |
3% (1) | CWE-190 | Integer Overflow or Wraparound |
3% (1) | CWE-116 | Improper Encoding or Escaping of Output |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | MongoDB nativeHelper.apply method command injection attempt RuleID : 26262 - Type : SERVER-OTHER - Revision : 5 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0052.nasl - Type: ACT_GATHER_INFO |
2017-11-16 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1275.nasl - Type: ACT_GATHER_INFO |
2016-11-21 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201611-13.nasl - Type: ACT_GATHER_INFO |
2016-11-15 | Name: The remote Fedora host is missing a security update. File: fedora_2016-9a8e2bbc04.nasl - Type: ACT_GATHER_INFO |
2016-10-07 | Name: The remote Fedora host is missing a security update. File: fedora_2016-89060100d7.nasl - Type: ACT_GATHER_INFO |
2016-10-06 | Name: The remote Fedora host is missing a security update. File: fedora_2016-4cedbd4308.nasl - Type: ACT_GATHER_INFO |
2016-08-09 | Name: The remote Debian host is missing a security update. File: debian_DLA-588.nasl - Type: ACT_GATHER_INFO |
2016-02-24 | Name: The remote database server is affected by a denial of service vulnerability. File: mongodb_2_6_8.nasl - Type: ACT_GATHER_INFO |
2015-03-30 | Name: The remote Fedora host is missing a security update. File: fedora_2015-4197.nasl - Type: ACT_GATHER_INFO |
2015-03-23 | Name: The remote Fedora host is missing a security update. File: fedora_2015-4003.nasl - Type: ACT_GATHER_INFO |
2014-07-22 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2014-0440.nasl - Type: ACT_GATHER_INFO |
2014-07-22 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2013-1170.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2013-522.nasl - Type: ACT_GATHER_INFO |
2014-02-05 | Name: The remote database server is affected by an information disclosure vulnerabi... File: mongodb_2_3_2.nasl - Type: ACT_GATHER_INFO |
2013-07-05 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-1897-1.nasl - Type: ACT_GATHER_INFO |
2013-06-11 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-2705.nasl - Type: ACT_GATHER_INFO |
2013-04-08 | Name: The remote Fedora host is missing a security update. File: fedora_2013-4539.nasl - Type: ACT_GATHER_INFO |
2013-04-08 | Name: The remote Fedora host is missing a security update. File: fedora_2013-4531.nasl - Type: ACT_GATHER_INFO |