All the vulnerabilites related to mongodb - c_driver
cve-2021-32050
Vulnerability from cvelistv5
Published
2023-08-29 15:24
Modified
2024-09-30 17:46
Summary
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
Impacted products
Vendor Product Version
MongoDB Inc MongoDB C++ Driver Version: 3.0.0   < 3.7.0
MongoDB Inc MongoDB PHP Driver Version: 1.0.0   < 1.9.2
MongoDB Inc MongoDB Swift Driver Version: 1.0.0   < 1.1.1
MongoDB Inc MongoDB Node.js Driver Version: 3.6   < 3.6.10
Version: 4.0   < 4.17.0
Version: 5.0   < 5.8.0
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:17:28.937Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/PHPC-1869"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/CXX-2028"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/SWIFT-1229"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/CDRIVER-3797"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/NODE-3356"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20231006-0001/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-32050",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-30T17:34:56.433321Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-30T17:46:35.484Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB C Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB C++ Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "3.7.0",
              "status": "affected",
              "version": "3.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB PHP Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.9.2",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB Swift Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.1.1",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB Node.js Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "3.6.10",
              "status": "affected",
              "version": "3.6",
              "versionType": "custom"
            },
            {
              "lessThan": "4.17.0",
              "status": "affected",
              "version": "4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.8.0",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThis issue only arises if an application enables the command listener feature (this is not enabled by default).\u003c/p\u003e"
            }
          ],
          "value": "This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\n"
        }
      ],
      "datePublic": "2023-08-29T16:21:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eSome MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\u003c/p\u003e\u003cp\u003eWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\u003c/p\u003e\u003cp\u003eThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).\u003c/p\u003e"
            }
          ],
          "value": "Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\n\nWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\nThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-29T15:24:30.389Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/PHPC-1869"
        },
        {
          "url": "https://jira.mongodb.org/browse/CXX-2028"
        },
        {
          "url": "https://jira.mongodb.org/browse/SWIFT-1229"
        },
        {
          "url": "https://jira.mongodb.org/browse/CDRIVER-3797"
        },
        {
          "url": "https://jira.mongodb.org/browse/NODE-3356"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20231006-0001/"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Some MongoDB Drivers may publish events containing authentication-related data to a command listener configured by an application",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2021-32050",
    "datePublished": "2023-08-29T15:24:30.389Z",
    "dateReserved": "2021-05-05T14:29:29.717Z",
    "dateUpdated": "2024-09-30T17:46:35.484Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-0437
Vulnerability from cvelistv5
Published
2024-01-12 13:33
Modified
2024-08-15 16:58
Summary
When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:10:56.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/CDRIVER-4747"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "c_driver",
            "vendor": "mongodb",
            "versions": [
              {
                "lessThan": "1.25.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-0437",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-17T17:59:44.056559Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T16:58:13.664Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB C Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.25.0",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "selmelc"
        }
      ],
      "datePublic": "2024-01-12T14:13:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eWhen calling \u003ctt\u003ebson_utf8_validate\u003c/tt\u003e\u0026nbsp;on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.\u003c/p\u003e"
            }
          ],
          "value": "When calling bson_utf8_validate\u00a0on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-835",
              "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-12T13:33:39.503Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/CDRIVER-4747"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MongoDB client C Driver may infinitely loop when validating certain BSON input data",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2023-0437",
    "datePublished": "2024-01-12T13:33:39.503Z",
    "dateReserved": "2023-01-23T11:11:02.350Z",
    "dateUpdated": "2024-08-15T16:58:13.664Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12135
Vulnerability from cvelistv5
Published
2020-04-24 00:31
Modified
2024-08-04 11:48
Severity ?
Summary
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.185Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577"
          },
          {
            "name": "USN-4450-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4450-1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-12T16:06:11",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577"
        },
        {
          "name": "USN-4450-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4450-1/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-12135",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560",
              "refsource": "MISC",
              "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560"
            },
            {
              "name": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch",
              "refsource": "MISC",
              "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch"
            },
            {
              "name": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577",
              "refsource": "MISC",
              "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577"
            },
            {
              "name": "USN-4450-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4450-1/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-12135",
    "datePublished": "2020-04-24T00:31:51",
    "dateReserved": "2020-04-24T00:00:00",
    "dateUpdated": "2024-08-04T11:48:58.185Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-7553
Vulnerability from cvelistv5
Published
2024-08-07 09:57
Modified
2024-08-07 15:27
Summary
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1. Required Configuration: Only environments with Windows as the underlying operating system is affected by this issue
Impacted products
Vendor Product Version
MongoDB Inc MongoDB C Driver Version: 0   < 1.26.2
MongoDB Inc MongoDB PHP Driver Version: 0   < 1.18.1
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-7553",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T15:27:26.847490Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:27:46.258Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.3.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.5.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.5.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.6:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.7:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.7.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.8:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.8.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.90.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.92.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.92.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.94.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.94.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.96.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.96.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.96.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.98.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:0.98.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.0.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.0.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.6:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.7:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.8:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.9:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.10:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.1.11:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.2.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.2.0:beta:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.2.0:beta1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.2.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.2.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.2.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.2.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.2.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.0:beta0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.3.6:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.4.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.4.0:beta0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.4.0:beta1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.4.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.4.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.4.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.0:rc2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.0:rc3:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.0:rc4:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.0:rc6:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.5.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.6.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.6.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.6.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.6.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.6.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.7.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.7.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.7.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.7.0:rc2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.8.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.8.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.8.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.8.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.8.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.9.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.9.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.9.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.9.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.9.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.9.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.9.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.9.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.10.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.10.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.10.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.10.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.11.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.12.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.13.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.13.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.14.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.14.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.15.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.15.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.15.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.15.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.16.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.16.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.16.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.0:beta:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.0:beta2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.6:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.17.7:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.18.0:alpha:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.18.0:alpha2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.18.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.19.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.19.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.19.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.20.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.20.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.21.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.21.0:beta0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.21.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.21.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.22.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.22.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.22.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.23.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.23.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.23.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.23.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.23.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.23.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.24.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.24.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.24.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.24.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.24.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.25.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.25.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.25.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.25.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.25.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.26.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:c_driver:1.26.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.1.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.1.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.1.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.1.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.1.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.1.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.2.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.3.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.3.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.4.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.4.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.5.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.5.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.6.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.6.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.6.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:0.6.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.0.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.0.0:alpha1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.0.0:alpha2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.0.0:beta1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.0.0:beta2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.0.0:rc0:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.0.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.6:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.7:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.8:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.9:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.1.10:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha3:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.6:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.7:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.8:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.9:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.10:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.2.11:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.3.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.3.0:beta1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.3.0:beta2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.3.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.3.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.3.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.3.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.3.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.4.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.4.0:beta1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.4.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.4.0:rc2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.4.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.4.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.4.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.4.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.5.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.5.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.5.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.5.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.5.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.5.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.6.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha3:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.6.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.6.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.7.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.7.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.7.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.7.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.7.4:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.7.5:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.8.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.8.0:beta1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.8.0:beta2:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.8.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.8.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.8.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.9.0:-:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.9.0:rc1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.9.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.9.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.10.0:alpha1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.10.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.11.0:alpha1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.11.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.11.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.12.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.12.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.13.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.14.0:beta1:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.14.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.14.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.14.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.15.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.15.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.15.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.15.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.16.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.16.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.16.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.17.0:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.17.1:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.17.2:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.17.3:*:*:*:*:mongodb:*:*",
            "cpe:2.3:a:mongodb:php_driver:1.18.0:*:*:*:*:mongodb:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "MongoDB Server",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "5.0.27",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.16",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.0.12",
              "status": "affected",
              "version": "7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.3.3",
              "status": "affected",
              "version": "7.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB C Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.26.2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB PHP Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.18.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: var(--wht);\"\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/span\u003e\u003cbr\u003e\u003ci\u003e\u003cbr\u003e\u003c/i\u003e\u003cbr\u003e"
            }
          ],
          "value": "Only environments with Windows as the underlying operating system is affected by this issue"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "T. Do\u011fa Geli\u015fli"
        }
      ],
      "datePublic": "2024-08-07T09:55:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIncorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cp\u003e\u003cb\u003eRequired Configuration:\u003c/b\u003e\u003c/p\u003e\u003cp\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/p\u003e"
            }
          ],
          "value": "Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.\n\nRequired Configuration:\n\nOnly environments with Windows as the underlying operating system is affected by this issue"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284: Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-07T12:51:42.281Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/PHPC-2369"
        },
        {
          "url": "https://jira.mongodb.org/browse/SERVER-93211"
        },
        {
          "url": "https://jira.mongodb.org/browse/CDRIVER-5650"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Accessing Untrusted Directory May Allow Local Privilege Escalation",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2024-7553",
    "datePublished": "2024-08-07T09:57:49.818Z",
    "dateReserved": "2024-08-06T08:34:10.195Z",
    "dateUpdated": "2024-08-07T15:27:46.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2023-08-29 16:15
Modified
2024-11-21 06:06
Summary
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:c\\+\\+:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "09486555-7473-46FA-B646-E6AA6ECB005F",
              "versionEndExcluding": "1.17.7",
              "versionStartIncluding": "1.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "FCB74F72-5943-472D-A787-363B6B6AAC45",
              "versionEndExcluding": "1.17.7",
              "versionStartIncluding": "1.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "AD1E66B4-D728-41EE-8D61-967D411BA260",
              "versionEndExcluding": "3.6.10",
              "versionStartIncluding": "3.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "9DE0FDB0-1227-465E-9F95-F3689BBD5C74",
              "versionEndExcluding": "4.17.0",
              "versionStartIncluding": "4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "0C560F25-FF53-437A-8D60-FB5CC356AE60",
              "versionEndExcluding": "5.8.0",
              "versionStartIncluding": "5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "1284F2B7-7338-4796-B993-9FB547DC2869",
              "versionEndExcluding": "1.9.2",
              "versionStartIncluding": "1.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mongodb:swift_driver:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "89AA28DB-8B7B-46FC-9DDB-8912BD6EA26D",
              "versionEndExcluding": "1.1.1",
              "versionStartIncluding": "1.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\n\nWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\nThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).\n\n"
    }
  ],
  "id": "CVE-2021-32050",
  "lastModified": "2024-11-21T06:06:45.880",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.6,
        "impactScore": 3.6,
        "source": "cna@mongodb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-29T16:15:08.423",
  "references": [
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/CDRIVER-3797"
    },
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/CXX-2028"
    },
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/NODE-3356"
    },
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/PHPC-1869"
    },
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://jira.mongodb.org/browse/SWIFT-1229"
    },
    {
      "source": "cna@mongodb.com",
      "url": "https://security.netapp.com/advisory/ntap-20231006-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/CDRIVER-3797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/CXX-2028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/NODE-3356"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/PHPC-1869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://jira.mongodb.org/browse/SWIFT-1229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20231006-0001/"
    }
  ],
  "sourceIdentifier": "cna@mongodb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "cna@mongodb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-532"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-07 10:15
Modified
2024-09-19 20:46
Summary
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1. Required Configuration: Only environments with Windows as the underlying operating system is affected by this issue
Impacted products
Vendor Product Version
mongodb mongodb *
microsoft windows_10_1507 -
microsoft windows_10_1511 -
microsoft windows_10_1607 -
microsoft windows_10_1703 -
microsoft windows_10_1709 -
microsoft windows_10_1803 -
microsoft windows_10_1809 -
microsoft windows_10_1903 -
microsoft windows_10_1909 -
microsoft windows_10_2004 -
microsoft windows_10_20h2 -
microsoft windows_10_21h1 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_server_2016 -
microsoft windows_server_2019 -
mongodb mongodb *
microsoft windows_10_1507 -
microsoft windows_10_1511 -
microsoft windows_10_1607 -
microsoft windows_10_1703 -
microsoft windows_10_1709 -
microsoft windows_10_1803 -
microsoft windows_10_1809 -
microsoft windows_10_1903 -
microsoft windows_10_1909 -
microsoft windows_10_2004 -
microsoft windows_10_20h2 -
microsoft windows_10_21h1 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_server_2016 -
microsoft windows_server_2019 -
mongodb mongodb *
mongodb mongodb *
microsoft windows_11 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_23h2 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
mongodb c_driver *
microsoft windows_10_1507 -
microsoft windows_10_1511 -
microsoft windows_10_1607 -
microsoft windows_10_1703 -
microsoft windows_10_1709 -
microsoft windows_10_1803 -
microsoft windows_10_1809 -
microsoft windows_10_1903 -
microsoft windows_10_1909 -
microsoft windows_10_2004 -
microsoft windows_10_20h2 -
microsoft windows_10_21h1 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_11 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_23h2 -
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
mongodb php_driver *
microsoft windows_10_1507 -
microsoft windows_10_1511 -
microsoft windows_10_1607 -
microsoft windows_10_1703 -
microsoft windows_10_1709 -
microsoft windows_10_1803 -
microsoft windows_10_1809 -
microsoft windows_10_1903 -
microsoft windows_10_1909 -
microsoft windows_10_2004 -
microsoft windows_10_20h2 -
microsoft windows_10_21h1 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_11 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_23h2 -
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10BC49C-B4A2-41FF-98D3-6BF65E7B4284",
              "versionEndExcluding": "5.0.27",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4962B5E-0143-497C-9EBB-B5B675D8E461",
              "versionEndExcluding": "6.0.16",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3F476DE-A977-4F42-8637-833187D807BD",
              "versionEndExcluding": "7.0.12",
              "versionStartIncluding": "7.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "006DFE2F-6693-4BFE-AA9C-B535CF2BEC6D",
              "versionEndExcluding": "7.3.3",
              "versionStartIncluding": "7.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "806BC7F3-24A8-4A50-BA80-04A443407073",
              "versionEndExcluding": "1.26.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "604ED63D-4BC1-42DA-97C5-D09239230986",
              "versionEndExcluding": "1.18.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.\n\nRequired Configuration:\n\nOnly environments with Windows as the underlying operating system is affected by this issue"
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n incorrecta de archivos cargados desde un directorio local no confiable puede permitir la escalada de privilegios locales si el sistema operativo subyacente es Windows. Esto puede provocar que la aplicaci\u00f3n ejecute un comportamiento arbitrario determinado por el contenido de los archivos no confiables. Este problema afecta a las versiones de MongoDB Server v5.0 anteriores a la 5.0.27, MongoDB Server v6.0 anteriores a la 6.0.16, MongoDB Server v7.0 anteriores a la 7.0.12, MongoDB Server v7.3 anteriores a la 7.3.3, MongoDB C Driver anteriores a la 1.26.2 y MongoDB PHP Driver anteriores a la 1.18.1. Configuraci\u00f3n requerida: este problema solo afecta a los entornos con Windows como sistema operativo subyacente."
    }
  ],
  "id": "CVE-2024-7553",
  "lastModified": "2024-09-19T20:46:04.103",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "cna@mongodb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-07T10:15:39.493",
  "references": [
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/CDRIVER-5650"
    },
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/PHPC-2369"
    },
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/SERVER-93211"
    }
  ],
  "sourceIdentifier": "cna@mongodb.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "cna@mongodb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-12 14:15
Modified
2024-11-21 07:37
Summary
When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.
Impacted products
Vendor Product Version
mongodb c_driver *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*",
              "matchCriteriaId": "82F06E2D-CEA4-4506-A89D-50D8E6551222",
              "versionEndExcluding": "1.25.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "When calling bson_utf8_validate\u00a0on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.\n\n"
    },
    {
      "lang": "es",
      "value": "Al llamar a bson_utf8_validate en algunas entradas puede ocurrir un bucle con una condici\u00f3n de salida que no se puede alcanzar, es decir, un bucle infinito. Este problema afecta a All MongoDB C Driver anteriores a la versi\u00f3n 1.25.0."
    }
  ],
  "id": "CVE-2023-0437",
  "lastModified": "2024-11-21T07:37:10.753",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "cna@mongodb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-01-12T14:15:47.387",
  "references": [
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/CDRIVER-4747"
    },
    {
      "source": "cna@mongodb.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/CDRIVER-4747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/"
    }
  ],
  "sourceIdentifier": "cna@mongodb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "cna@mongodb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-04-24 01:15
Modified
2024-11-21 04:59
Summary
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
Impacted products
Vendor Product Version
whoopsie_project whoopsie *
mongodb c_driver *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:whoopsie_project:whoopsie:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31886E49-F328-4FE2-B04C-0D7EBC6082B8",
              "versionEndIncluding": "0.2.69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B88603-D79A-4501-B0A6-DA1F586C56D9",
              "versionEndExcluding": "0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input."
    },
    {
      "lang": "es",
      "value": "bson en versiones anteriores a la 0.8 usa incorrectamente int en lugar de size_t para muchas variables, par\u00e1metros y valores de retorno. En particular, el par\u00e1metro bson_ensure_space () bytesNeeded podr\u00eda tener un desbordamiento de enteros a trav\u00e9s de una entrada bson construida correctamente."
    }
  ],
  "id": "CVE-2020-12135",
  "lastModified": "2024-11-21T04:59:19.263",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-24T01:15:11.430",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/4450-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/4450-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}