All the vulnerabilites related to mongodb - c_driver
cve-2021-32050
Vulnerability from cvelistv5
Published
2023-08-29 15:24
Modified
2024-09-30 17:46
Severity ?
EPSS score ?
Summary
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.
Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).
This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | MongoDB Inc | MongoDB C Driver |
Version: 1.0.0 < 1.17.7 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:17:28.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jira.mongodb.org/browse/PHPC-1869" }, { "tags": [ "x_transferred" ], "url": "https://jira.mongodb.org/browse/CXX-2028" }, { "tags": [ "x_transferred" ], "url": "https://jira.mongodb.org/browse/SWIFT-1229" }, { "tags": [ "x_transferred" ], "url": "https://jira.mongodb.org/browse/CDRIVER-3797" }, { "tags": [ "x_transferred" ], "url": "https://jira.mongodb.org/browse/NODE-3356" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231006-0001/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-32050", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-30T17:34:56.433321Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-30T17:46:35.484Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "MongoDB C Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "1.17.7", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MongoDB C++ Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "3.7.0", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MongoDB PHP Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "1.9.2", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MongoDB Swift Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "1.1.1", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MongoDB Node.js Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "3.6.10", "status": "affected", "version": "3.6", "versionType": "custom" }, { "lessThan": "4.17.0", "status": "affected", "version": "4.0", "versionType": "custom" }, { "lessThan": "5.8.0", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue only arises if an application enables the command listener feature (this is not enabled by default).\u003c/p\u003e" } ], "value": "This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\n" } ], "datePublic": "2023-08-29T16:21:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eSome MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\u003c/p\u003e\u003cp\u003eWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\u003c/p\u003e\u003cp\u003eThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).\u003c/p\u003e" } ], "value": "Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\n\nWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\nThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-29T15:24:30.389Z", "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "shortName": "mongodb" }, "references": [ { "url": "https://jira.mongodb.org/browse/PHPC-1869" }, { "url": "https://jira.mongodb.org/browse/CXX-2028" }, { "url": "https://jira.mongodb.org/browse/SWIFT-1229" }, { "url": "https://jira.mongodb.org/browse/CDRIVER-3797" }, { "url": "https://jira.mongodb.org/browse/NODE-3356" }, { "url": "https://security.netapp.com/advisory/ntap-20231006-0001/" } ], "source": { "discovery": "INTERNAL" }, "title": "Some MongoDB Drivers may publish events containing authentication-related data to a command listener configured by an application", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "assignerShortName": "mongodb", "cveId": "CVE-2021-32050", "datePublished": "2023-08-29T15:24:30.389Z", "dateReserved": "2021-05-05T14:29:29.717Z", "dateUpdated": "2024-09-30T17:46:35.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0437
Vulnerability from cvelistv5
Published
2024-01-12 13:33
Modified
2024-08-15 16:58
Severity ?
EPSS score ?
Summary
When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | MongoDB Inc | MongoDB C Driver |
Version: 1.0.0 < 1.25.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:56.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jira.mongodb.org/browse/CDRIVER-4747" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*" ], "defaultStatus": "unknown", "product": "c_driver", "vendor": "mongodb", "versions": [ { "lessThan": "1.25.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-0437", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-17T17:59:44.056559Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T16:58:13.664Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "MongoDB C Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "1.25.0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "selmelc" } ], "datePublic": "2024-01-12T14:13:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eWhen calling \u003ctt\u003ebson_utf8_validate\u003c/tt\u003e\u0026nbsp;on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.\u003c/p\u003e" } ], "value": "When calling bson_utf8_validate\u00a0on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T13:33:39.503Z", "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "shortName": "mongodb" }, "references": [ { "url": "https://jira.mongodb.org/browse/CDRIVER-4747" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/" } ], "source": { "discovery": "EXTERNAL" }, "title": "MongoDB client C Driver may infinitely loop when validating certain BSON input data", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "assignerShortName": "mongodb", "cveId": "CVE-2023-0437", "datePublished": "2024-01-12T13:33:39.503Z", "dateReserved": "2023-01-23T11:11:02.350Z", "dateUpdated": "2024-08-15T16:58:13.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12135
Vulnerability from cvelistv5
Published
2020-04-24 00:31
Modified
2024-08-04 11:48
Severity ?
EPSS score ?
Summary
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
References
▼ | URL | Tags |
---|---|---|
https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560 | x_refsource_MISC | |
https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch | x_refsource_MISC | |
https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577 | x_refsource_MISC | |
https://usn.ubuntu.com/4450-1/ | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577" }, { "name": "USN-4450-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4450-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-12T16:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577" }, { "name": "USN-4450-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4450-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12135", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560", "refsource": "MISC", "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560" }, { "name": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch", "refsource": "MISC", "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch" }, { "name": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577", "refsource": "MISC", "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577" }, { "name": "USN-4450-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4450-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12135", "datePublished": "2020-04-24T00:31:51", "dateReserved": "2020-04-24T00:00:00", "dateUpdated": "2024-08-04T11:48:58.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7553
Vulnerability from cvelistv5
Published
2024-08-07 09:57
Modified
2024-08-07 15:27
Severity ?
EPSS score ?
Summary
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.
Required Configuration:
Only environments with Windows as the underlying operating system is affected by this issue
References
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | MongoDB Inc | MongoDB Server |
Version: 5.0 < 5.0.27 Version: 6.0 < 6.0.16 Version: 7.0 < 7.0.12 Version: 7.3 < 7.3.3 cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:c_driver:0.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.3.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.5.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.5.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.7.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.8:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.8.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.90.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.92.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.92.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.94.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.94.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.96.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.96.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.96.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.98.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.98.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.0.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.0.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.8:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.9:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.10:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.11:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.0:beta:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.0:beta0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.0:beta0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc3:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc4:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc6:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.7.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.7.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.7.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.7.0:rc2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.10.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.10.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.10.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.10.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.11.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.12.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.13.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.13.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.14.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.14.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.15.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.15.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.15.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.15.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.16.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.16.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.16.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.0:beta:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.0:beta2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.18.0:alpha:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.18.0:alpha2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.18.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.19.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.19.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.19.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.20.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.20.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.21.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.21.0:beta0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.21.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.21.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.22.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.22.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.22.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.26.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.26.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.2.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.3.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.3.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.4.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.4.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.5.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.5.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.6.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.6.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.6.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.6.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:alpha2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:beta2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.8:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.9:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.10:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.0:alpha2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.0:alpha3:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.8:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.9:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.10:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.11:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.0:beta2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.0:rc2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:alpha2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:alpha3:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.0:beta2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.9.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.9.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.9.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.9.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.10.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.10.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.11.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.11.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.11.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.12.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.12.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.13.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.14.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.14.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.14.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.14.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.15.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.15.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.15.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.15.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.16.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.16.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.16.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.17.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.17.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.17.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.17.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.18.0:*:*:*:*:mongodb:*:* |
||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7553", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T15:27:26.847490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-07T15:27:46.258Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:c_driver:0.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.7.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.90.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.92.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.92.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.94.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.94.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.98.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.98.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.0.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.0.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.11:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:beta:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc4:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc6:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.11.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.12.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.13.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.13.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.14.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.14.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:beta:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:alpha:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.20.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.20.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.26.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.26.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.2.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.3.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.4.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.5.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.11:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.10.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.10.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.12.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.12.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.13.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.18.0:*:*:*:*:mongodb:*:*" ], "defaultStatus": "unaffected", "product": "MongoDB Server", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "5.0.27", "status": "affected", "version": "5.0", "versionType": "custom" }, { "lessThan": "6.0.16", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThan": "7.0.12", "status": "affected", "version": "7.0", "versionType": "custom" }, { "lessThan": "7.3.3", "status": "affected", "version": "7.3", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MongoDB C Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "1.26.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MongoDB PHP Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "1.18.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: var(--wht);\"\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/span\u003e\u003cbr\u003e\u003ci\u003e\u003cbr\u003e\u003c/i\u003e\u003cbr\u003e" } ], "value": "Only environments with Windows as the underlying operating system is affected by this issue" } ], "credits": [ { "lang": "en", "type": "finder", "value": "T. Do\u011fa Geli\u015fli" } ], "datePublic": "2024-08-07T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIncorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cp\u003e\u003cb\u003eRequired Configuration:\u003c/b\u003e\u003c/p\u003e\u003cp\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/p\u003e" } ], "value": "Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.\n\nRequired Configuration:\n\nOnly environments with Windows as the underlying operating system is affected by this issue" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T12:51:42.281Z", "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "shortName": "mongodb" }, "references": [ { "url": "https://jira.mongodb.org/browse/PHPC-2369" }, { "url": "https://jira.mongodb.org/browse/SERVER-93211" }, { "url": "https://jira.mongodb.org/browse/CDRIVER-5650" } ], "source": { "discovery": "EXTERNAL" }, "title": "Accessing Untrusted Directory May Allow Local Privilege Escalation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "assignerShortName": "mongodb", "cveId": "CVE-2024-7553", "datePublished": "2024-08-07T09:57:49.818Z", "dateReserved": "2024-08-06T08:34:10.195Z", "dateUpdated": "2024-08-07T15:27:46.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-08-29 16:15
Modified
2024-11-21 06:06
Severity ?
4.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.
Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).
This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongodb:c\\+\\+:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "09486555-7473-46FA-B646-E6AA6ECB005F", "versionEndExcluding": "1.17.7", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "FCB74F72-5943-472D-A787-363B6B6AAC45", "versionEndExcluding": "1.17.7", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "AD1E66B4-D728-41EE-8D61-967D411BA260", "versionEndExcluding": "3.6.10", "versionStartIncluding": "3.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "9DE0FDB0-1227-465E-9F95-F3689BBD5C74", "versionEndExcluding": "4.17.0", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "0C560F25-FF53-437A-8D60-FB5CC356AE60", "versionEndExcluding": "5.8.0", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "1284F2B7-7338-4796-B993-9FB547DC2869", "versionEndExcluding": "1.9.2", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mongodb:swift_driver:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "89AA28DB-8B7B-46FC-9DDB-8912BD6EA26D", "versionEndExcluding": "1.1.1", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\n\nWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\nThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).\n\n" } ], "id": "CVE-2021-32050", "lastModified": "2024-11-21T06:06:45.880", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.6, "impactScore": 3.6, "source": "cna@mongodb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-29T16:15:08.423", "references": [ { "source": "cna@mongodb.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/CDRIVER-3797" }, { "source": "cna@mongodb.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/CXX-2028" }, { "source": "cna@mongodb.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/NODE-3356" }, { "source": "cna@mongodb.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/PHPC-1869" }, { "source": "cna@mongodb.com", "tags": [ "Issue Tracking" ], "url": "https://jira.mongodb.org/browse/SWIFT-1229" }, { "source": "cna@mongodb.com", "url": "https://security.netapp.com/advisory/ntap-20231006-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/CDRIVER-3797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/CXX-2028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/NODE-3356" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/PHPC-1869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://jira.mongodb.org/browse/SWIFT-1229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20231006-0001/" } ], "sourceIdentifier": "cna@mongodb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "cna@mongodb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-07 10:15
Modified
2024-09-19 20:46
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.
Required Configuration:
Only environments with Windows as the underlying operating system is affected by this issue
References
▼ | URL | Tags | |
---|---|---|---|
cna@mongodb.com | https://jira.mongodb.org/browse/CDRIVER-5650 | Vendor Advisory | |
cna@mongodb.com | https://jira.mongodb.org/browse/PHPC-2369 | Vendor Advisory | |
cna@mongodb.com | https://jira.mongodb.org/browse/SERVER-93211 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", "matchCriteriaId": "D10BC49C-B4A2-41FF-98D3-6BF65E7B4284", "versionEndExcluding": "5.0.27", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4962B5E-0143-497C-9EBB-B5B675D8E461", "versionEndExcluding": "6.0.16", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3F476DE-A977-4F42-8637-833187D807BD", "versionEndExcluding": "7.0.12", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", "matchCriteriaId": "006DFE2F-6693-4BFE-AA9C-B535CF2BEC6D", "versionEndExcluding": "7.3.3", "versionStartIncluding": "7.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*", "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "806BC7F3-24A8-4A50-BA80-04A443407073", "versionEndExcluding": "1.26.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*", "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "604ED63D-4BC1-42DA-97C5-D09239230986", "versionEndExcluding": "1.18.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*", "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.\n\nRequired Configuration:\n\nOnly environments with Windows as the underlying operating system is affected by this issue" }, { "lang": "es", "value": "La validaci\u00f3n incorrecta de archivos cargados desde un directorio local no confiable puede permitir la escalada de privilegios locales si el sistema operativo subyacente es Windows. Esto puede provocar que la aplicaci\u00f3n ejecute un comportamiento arbitrario determinado por el contenido de los archivos no confiables. Este problema afecta a las versiones de MongoDB Server v5.0 anteriores a la 5.0.27, MongoDB Server v6.0 anteriores a la 6.0.16, MongoDB Server v7.0 anteriores a la 7.0.12, MongoDB Server v7.3 anteriores a la 7.3.3, MongoDB C Driver anteriores a la 1.26.2 y MongoDB PHP Driver anteriores a la 1.18.1. Configuraci\u00f3n requerida: este problema solo afecta a los entornos con Windows como sistema operativo subyacente." } ], "id": "CVE-2024-7553", "lastModified": "2024-09-19T20:46:04.103", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "cna@mongodb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-07T10:15:39.493", "references": [ { "source": "cna@mongodb.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/CDRIVER-5650" }, { "source": "cna@mongodb.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/PHPC-2369" }, { "source": "cna@mongodb.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/SERVER-93211" } ], "sourceIdentifier": "cna@mongodb.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "cna@mongodb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-12 14:15
Modified
2024-11-21 07:37
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*", "matchCriteriaId": "82F06E2D-CEA4-4506-A89D-50D8E6551222", "versionEndExcluding": "1.25.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When calling bson_utf8_validate\u00a0on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.\n\n" }, { "lang": "es", "value": "Al llamar a bson_utf8_validate en algunas entradas puede ocurrir un bucle con una condici\u00f3n de salida que no se puede alcanzar, es decir, un bucle infinito. Este problema afecta a All MongoDB C Driver anteriores a la versi\u00f3n 1.25.0." } ], "id": "CVE-2023-0437", "lastModified": "2024-11-21T07:37:10.753", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "cna@mongodb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-12T14:15:47.387", "references": [ { "source": "cna@mongodb.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/CDRIVER-4747" }, { "source": "cna@mongodb.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.mongodb.org/browse/CDRIVER-4747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/" } ], "sourceIdentifier": "cna@mongodb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "cna@mongodb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-24 01:15
Modified
2024-11-21 04:59
Severity ?
Summary
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
whoopsie_project | whoopsie | * | |
mongodb | c_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whoopsie_project:whoopsie:*:*:*:*:*:*:*:*", "matchCriteriaId": "31886E49-F328-4FE2-B04C-0D7EBC6082B8", "versionEndIncluding": "0.2.69", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B88603-D79A-4501-B0A6-DA1F586C56D9", "versionEndExcluding": "0.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input." }, { "lang": "es", "value": "bson en versiones anteriores a la 0.8 usa incorrectamente int en lugar de size_t para muchas variables, par\u00e1metros y valores de retorno. En particular, el par\u00e1metro bson_ensure_space () bytesNeeded podr\u00eda tener un desbordamiento de enteros a trav\u00e9s de una entrada bson construida correctamente." } ], "id": "CVE-2020-12135", "lastModified": "2024-11-21T04:59:19.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-24T01:15:11.430", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4450-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://launchpadlibrarian.net/474887364/bson-fix-overflow.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4450-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }