Search criteria

20 vulnerabilities found for compass by mongodb

CERTFR-2025-AVI-0166

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans MongoDB. Elles permettent à un attaquant de provoquer une élévation de privilèges et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
MongoDB Mongosh mongosh versions antérieures à 2.3.9
MongoDB Compass Compass version antérieures à 1.42.1
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "mongosh versions ant\u00e9rieures \u00e0 2.3.9",
      "product": {
        "name": "Mongosh",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    },
    {
      "description": "Compass version ant\u00e9rieures \u00e0 1.42.1",
      "product": {
        "name": "Compass",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-1692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1692"
    },
    {
      "name": "CVE-2025-1691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1691"
    },
    {
      "name": "CVE-2025-1756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1756"
    },
    {
      "name": "CVE-2025-1755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1755"
    },
    {
      "name": "CVE-2025-1693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1693"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0166",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans MongoDB. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans MongoDB",
  "vendor_advisories": [
    {
      "published_at": "2025-02-27",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB MONGOSH-2026",
      "url": "https://jira.mongodb.org/browse/MONGOSH-2026"
    },
    {
      "published_at": "2025-02-27",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB MONGOSH-2028",
      "url": "https://jira.mongodb.org/browse/MONGOSH-2028"
    },
    {
      "published_at": "2025-02-27",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB MONGOSH-2025",
      "url": "https://jira.mongodb.org/browse/MONGOSH-2025"
    },
    {
      "published_at": "2025-02-27",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB COMPASS-9058",
      "url": "https://jira.mongodb.org/browse/COMPASS-9058"
    },
    {
      "published_at": "2025-02-27",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB MONGOSH-2024",
      "url": "https://jira.mongodb.org/browse/MONGOSH-2024"
    }
  ]
}

CERTFR-2024-AVI-0537

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans MongoDB. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
MongoDB Server MongoDB Server versions 5.x antérieures à 5.0.22
MongoDB Compass MongoDB Compass versions antérieures à 1.42.2
MongoDB Server MongoDB Server versions 7.x antérieures à 7.0.3
MongoDB N/A libbson versions antérieures à 1.26.2
MongoDB Server MongoDB Server versions 6.x antérieures à 6.0.11
MongoDB Rust Driver MongoDB Rust Driver versions 2.x antérieures à 2.8.2
References
Bulletin de sécurité MongoDB COMPASS-7496 2024-07-01 vendor-advisory
Bulletin de sécurité MongoDB CDRIVER-5622 2024-07-02 vendor-advisory
Bulletin de sécurité MongoDB SERVER-79327 2024-07-01 vendor-advisory
Bulletin de sécurité MongoDB RUST-1881 2024-07-02 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "MongoDB Server versions 5.x ant\u00e9rieures \u00e0 5.0.22",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    },
    {
      "description": "MongoDB Compass versions ant\u00e9rieures \u00e0 1.42.2",
      "product": {
        "name": "Compass",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    },
    {
      "description": "MongoDB Server versions 7.x ant\u00e9rieures \u00e0 7.0.3",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    },
    {
      "description": "libbson versions ant\u00e9rieures \u00e0 1.26.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    },
    {
      "description": "MongoDB Server versions 6.x ant\u00e9rieures \u00e0 6.0.11",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    },
    {
      "description": "MongoDB Rust Driver versions 2.x ant\u00e9rieures \u00e0 2.8.2",
      "product": {
        "name": "Rust Driver",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-6382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6382"
    },
    {
      "name": "CVE-2024-6376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6376"
    },
    {
      "name": "CVE-2024-6375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6375"
    },
    {
      "name": "CVE-2024-6381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6381"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0537",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans MongoDB. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans MongoDB",
  "vendor_advisories": [
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB COMPASS-7496",
      "url": "https://jira.mongodb.org/browse/COMPASS-7496"
    },
    {
      "published_at": "2024-07-02",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB CDRIVER-5622",
      "url": "https://jira.mongodb.org/browse/CDRIVER-5622"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB SERVER-79327",
      "url": "https://jira.mongodb.org/browse/SERVER-79327"
    },
    {
      "published_at": "2024-07-02",
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB RUST-1881",
      "url": "https://jira.mongodb.org/browse/RUST-1881"
    }
  ]
}

CERTFR-2024-AVI-0348

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans les produits MongoDB. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
MongoDB Compass MongoDB Compass versions 1.35.0 à 1.40.5 antérieures à 1.42.1
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "MongoDB Compass versions 1.35.0 \u00e0 1.40.5 ant\u00e9rieures \u00e0 1.42.1",
      "product": {
        "name": "Compass",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-3371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3371"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0348",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits MongoDB\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits MongoDB",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB COMPASS-7260 du 24 avril 2024",
      "url": "https://jira.mongodb.org/browse/COMPASS-7260"
    }
  ]
}

CERTFR-2021-AVI-243

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans MongoDB Compass. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
MongoDB Compass MongoDB Compass versions antérieures à 1.25.0

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "MongoDB Compass versions ant\u00e9rieures \u00e0 1.25.0",
      "product": {
        "name": "Compass",
        "vendor": {
          "name": "MongoDB",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-20334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20334"
    }
  ],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB\u00a0Compass du 06 avril 2021",
      "url": "https://jira.mongodb.org/browse/COMPASS-4510"
    }
  ],
  "reference": "CERTFR-2021-AVI-243",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-04-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans MongoDB Compass. Elle permet \u00e0\nun attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans MongoDB Compass",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 MongoDB Compass du 06 avril 2021",
      "url": null
    }
  ]
}

FKIE_CVE-2025-1755

Vulnerability from fkie_nvd - Published: 2025-02-27 16:15 - Updated: 2025-04-09 14:07
Summary
MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privileges, when a crafted file is stored in C:\node_modules\. This issue affects MongoDB Compass prior to 1.42.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF4CC4A-586E-4EEC-A2F8-0EA8CA343459",
              "versionEndExcluding": "1.42.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F7DAD7C-9369-4A87-A1D0-4208D3AF0CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB056B47-1F45-4CE4-81F6-872F66C24C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DA48001-66CC-4E71-A944-68D7D654031E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "083AAC55-E87B-482A-A1F4-8F2DEB90CB23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user\u0027s system with elevated privileges, when a crafted file is stored in C:\\node_modules\\. This issue affects MongoDB Compass prior to 1.42.1"
    },
    {
      "lang": "es",
      "value": "MongoDB Compass puede ser susceptible a una escalada de privilegios locales en determinadas condiciones, lo que podr\u00eda permitir acciones no autorizadas en el sistema de un usuario con privilegios elevados, cuando un archivo manipulado se almacena en C:\\node_modules\\. Este problema afecta a MongoDB Compass anterior a la versi\u00f3n 1.42.1."
    }
  ],
  "id": "CVE-2025-1755",
  "lastModified": "2025-04-09T14:07:43.140",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 6.0,
        "source": "cna@mongodb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-02-27T16:15:39.137",
  "references": [
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Vendor Advisory",
        "Issue Tracking"
      ],
      "url": "https://jira.mongodb.org/browse/COMPASS-9058"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2025:1755.html"
    }
  ],
  "sourceIdentifier": "cna@mongodb.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-426"
        }
      ],
      "source": "cna@mongodb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-426"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2024-6376

Vulnerability from fkie_nvd - Published: 2024-07-01 15:15 - Updated: 2024-11-21 09:49
Summary
MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2
References
Impacted products
Vendor Product Version
mongodb compass *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0CC548-DDB4-4527-AEBC-1993B3E39EDA",
              "versionEndExcluding": "1.42.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass\u0027 connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2"
    },
    {
      "lang": "es",
      "value": "MongoDB Compass puede ser susceptible a la inyecci\u00f3n de c\u00f3digo debido a una configuraci\u00f3n insuficiente de protecci\u00f3n de la zona de pruebas con el uso del analizador de shell ejson en el manejo de conexiones de Compass. Este problema afecta a las versiones de MongoDB Compass anteriores a la versi\u00f3n 1.42.2"
    }
  ],
  "id": "CVE-2024-6376",
  "lastModified": "2024-11-21T09:49:31.510",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "cna@mongodb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-07-01T15:15:17.673",
  "references": [
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/COMPASS-7496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/COMPASS-7496"
    }
  ],
  "sourceIdentifier": "cna@mongodb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "cna@mongodb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2024-3371

Vulnerability from fkie_nvd - Published: 2024-04-24 17:15 - Updated: 2025-02-06 17:58
Summary
MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.
Impacted products
Vendor Product Version
mongodb compass *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E151AA-FB8D-43A3-8F2A-6B822FE540DC",
              "versionEndExcluding": "1.42.1",
              "versionStartIncluding": "1.35.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.\n"
    },
    {
      "lang": "es",
      "value": "MongoDB Compass puede aceptar y utilizar entradas no suficientemente validadas de una fuente externa que no sea de confianza. Esto puede provocar un comportamiento no deseado de la aplicaci\u00f3n, incluida la divulgaci\u00f3n de datos y permitir que los atacantes se hagan pasar por usuarios. Este problema afecta a las versiones 1.35.0 a 1.40.5 de MongoDB Compass."
    }
  ],
  "id": "CVE-2024-3371",
  "lastModified": "2025-02-06T17:58:01.577",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.5,
        "source": "cna@mongodb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-04-24T17:15:47.230",
  "references": [
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/COMPASS-7260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/COMPASS-7260"
    }
  ],
  "sourceIdentifier": "cna@mongodb.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-360"
        }
      ],
      "source": "cna@mongodb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-20334

Vulnerability from fkie_nvd - Published: 2021-04-06 17:15 - Updated: 2024-11-21 05:46
Summary
A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows.
Impacted products
Vendor Product Version
mongodb compass *
microsoft windows -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A9E6B03-9F94-4021-9C28-B209B4B3D33C",
              "versionEndExcluding": "1.25.0",
              "versionStartIncluding": "1.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows."
    },
    {
      "lang": "es",
      "value": "Un tercero malicioso con acceso local a la m\u00e1quina de Windows donde MongoDB Compass est\u00e1 instalado puede ejecutar software arbitrario con los privilegios del usuario que est\u00e1 ejecutando MongoDB Compass.\u0026#xa0;Este problema afecta a: MongoDB Inc. MongoDB Compass versiones 1.x versi\u00f3n 1.3.0 en Windows y versiones posteriores;\u0026#xa0;versiones 1.x anteriores a 1.25.0 en Windows"
    }
  ],
  "id": "CVE-2021-20334",
  "lastModified": "2024-11-21T05:46:24.973",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 3.4,
        "source": "cna@mongodb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-04-06T17:15:12.603",
  "references": [
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/COMPASS-4510"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://jira.mongodb.org/browse/COMPASS-4510"
    }
  ],
  "sourceIdentifier": "cna@mongodb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "cna@mongodb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2025-1755 (GCVE-0-2025-1755)

Vulnerability from cvelistv5 – Published: 2025-02-27 15:24 – Updated: 2025-02-27 16:07
VLAI?
Summary
MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privileges, when a crafted file is stored in C:\node_modules\. This issue affects MongoDB Compass prior to 1.42.1
CWE
Assigner
Impacted products
Vendor Product Version
MongoDB Inc MongoDB Compass Affected: 0 , < 1.42.1 (custom)
    cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*
Create a notification for this product.
Credits
T. Doğa Gelişli
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1755",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-27T16:07:15.336525Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T16:07:45.320Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2025:1755.html"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "MongoDB Compass",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.42.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cp\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/p\u003e\u003c/div\u003e"
            }
          ],
          "value": "Only environments with Windows as the underlying operating system is affected by this issue"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "T. Do\u011fa Geli\u015fli"
        }
      ],
      "datePublic": "2025-02-27T13:08:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eMongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user\u0027s system with elevated privileges, when a crafted file is stored in C:\\node_modules\\. This issue affects MongoDB Compass prior to 1.42.1\u003c/p\u003e"
            }
          ],
          "value": "MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user\u0027s system with elevated privileges, when a crafted file is stored in C:\\node_modules\\. This issue affects MongoDB Compass prior to 1.42.1"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "CWE-426: Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-27T15:24:07.174Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/COMPASS-9058"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MongoDB Compass may be susceptible to local privilege escalation in Windows",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-1755",
    "datePublished": "2025-02-27T15:24:07.174Z",
    "dateReserved": "2025-02-27T13:02:01.480Z",
    "dateUpdated": "2025-02-27T16:07:45.320Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6376 (GCVE-0-2024-6376)

Vulnerability from cvelistv5 – Published: 2024-07-01 14:57 – Updated: 2024-08-01 21:33
VLAI?
Summary
MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
MongoDB Inc MongoDB Compass Affected: 0 , < 1.42.2 (custom)
    cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.42.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6376",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-01T20:45:03.494038Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-01T20:45:10.830Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:33:05.431Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/COMPASS-7496"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.42.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "MongoDB Compass",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.42.2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-07-01T14:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass\u0027 connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass\u0027 connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-01T14:57:31.704Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/COMPASS-7496"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ejson shell parser in MongoDB Compass maybe bypassed",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2024-6376",
    "datePublished": "2024-07-01T14:57:31.704Z",
    "dateReserved": "2024-06-27T07:55:22.098Z",
    "dateUpdated": "2024-08-01T21:33:05.431Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-3371 (GCVE-0-2024-3371)

Vulnerability from cvelistv5 – Published: 2024-04-24 16:32 – Updated: 2024-08-07 15:29
VLAI?
Summary
MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.
CWE
  • CWE-360 - Trust of System Event Data
Assigner
Impacted products
Vendor Product Version
MongoDB Inc MongoDB Compass Affected: 1.35.0 , ≤ 1.42.0 (custom)
    cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3371",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T15:29:36.154092Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:29:49.075Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:12:06.560Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/COMPASS-7260"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "MongoDB Compass",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThanOrEqual": "1.42.0",
              "status": "affected",
              "version": "1.35.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-04-24T16:32:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-360",
              "description": "CWE-360: Trust of System Event Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-26T14:20:07.672Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/COMPASS-7260"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Insufficient validation of external input in Compass may enable MITM attacks",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2024-3371",
    "datePublished": "2024-04-24T16:32:07.178Z",
    "dateReserved": "2024-04-05T12:44:52.126Z",
    "dateUpdated": "2024-08-07T15:29:49.075Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-20334 (GCVE-0-2021-20334)

Vulnerability from cvelistv5 – Published: 2021-04-06 16:45 – Updated: 2024-09-17 01:25
VLAI?
Summary
A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows.
CWE
  • CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
Vendor Product Version
MongoDB Inc. MongoDB Compass Affected: 1.3.0 , < 1.x* (custom)
Create a notification for this product.
Credits
Hou JingYi (@hjy79425575)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:37:23.920Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/COMPASS-4510"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Windows"
          ],
          "product": "MongoDB Compass",
          "vendor": "MongoDB Inc.",
          "versions": [
            {
              "changes": [
                {
                  "at": "1.25.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "1.x*",
              "status": "affected",
              "version": "1.3.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Hou JingYi (@hjy79425575)"
        }
      ],
      "datePublic": "2021-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-06T16:45:20",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.mongodb.org/browse/COMPASS-4510"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Local privilege escalation in MongoDB Compass for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@mongodb.com",
          "DATE_PUBLIC": "2021-04-06T17:00:00.000Z",
          "ID": "CVE-2021-20334",
          "STATE": "PUBLIC",
          "TITLE": "Local privilege escalation in MongoDB Compass for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MongoDB Compass",
                      "version": {
                        "version_data": [
                          {
                            "platform": "Windows",
                            "version_affected": "\u003e=",
                            "version_name": "1.x",
                            "version_value": "1.3.0"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "\u003c",
                            "version_name": "1.x",
                            "version_value": "1.25.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MongoDB Inc."
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Hou JingYi (@hjy79425575)"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-269 Improper Privilege Management"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.mongodb.org/browse/COMPASS-4510",
              "refsource": "MISC",
              "url": "https://jira.mongodb.org/browse/COMPASS-4510"
            }
          ]
        },
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2021-20334",
    "datePublished": "2021-04-06T16:45:20.154946Z",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-09-17T01:25:58.140Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-1755 (GCVE-0-2025-1755)

Vulnerability from nvd – Published: 2025-02-27 15:24 – Updated: 2025-02-27 16:07
VLAI?
Summary
MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privileges, when a crafted file is stored in C:\node_modules\. This issue affects MongoDB Compass prior to 1.42.1
CWE
Assigner
Impacted products
Vendor Product Version
MongoDB Inc MongoDB Compass Affected: 0 , < 1.42.1 (custom)
    cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*
Create a notification for this product.
Credits
T. Doğa Gelişli
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1755",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-27T16:07:15.336525Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T16:07:45.320Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2025:1755.html"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "MongoDB Compass",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.42.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cp\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/p\u003e\u003c/div\u003e"
            }
          ],
          "value": "Only environments with Windows as the underlying operating system is affected by this issue"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "T. Do\u011fa Geli\u015fli"
        }
      ],
      "datePublic": "2025-02-27T13:08:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eMongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user\u0027s system with elevated privileges, when a crafted file is stored in C:\\node_modules\\. This issue affects MongoDB Compass prior to 1.42.1\u003c/p\u003e"
            }
          ],
          "value": "MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user\u0027s system with elevated privileges, when a crafted file is stored in C:\\node_modules\\. This issue affects MongoDB Compass prior to 1.42.1"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "CWE-426: Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-27T15:24:07.174Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/COMPASS-9058"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MongoDB Compass may be susceptible to local privilege escalation in Windows",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-1755",
    "datePublished": "2025-02-27T15:24:07.174Z",
    "dateReserved": "2025-02-27T13:02:01.480Z",
    "dateUpdated": "2025-02-27T16:07:45.320Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6376 (GCVE-0-2024-6376)

Vulnerability from nvd – Published: 2024-07-01 14:57 – Updated: 2024-08-01 21:33
VLAI?
Summary
MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
MongoDB Inc MongoDB Compass Affected: 0 , < 1.42.2 (custom)
    cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.42.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6376",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-01T20:45:03.494038Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-01T20:45:10.830Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:33:05.431Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/COMPASS-7496"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.42.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "MongoDB Compass",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.42.2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-07-01T14:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass\u0027 connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass\u0027 connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-01T14:57:31.704Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/COMPASS-7496"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ejson shell parser in MongoDB Compass maybe bypassed",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2024-6376",
    "datePublished": "2024-07-01T14:57:31.704Z",
    "dateReserved": "2024-06-27T07:55:22.098Z",
    "dateUpdated": "2024-08-01T21:33:05.431Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-3371 (GCVE-0-2024-3371)

Vulnerability from nvd – Published: 2024-04-24 16:32 – Updated: 2024-08-07 15:29
VLAI?
Summary
MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.
CWE
  • CWE-360 - Trust of System Event Data
Assigner
Impacted products
Vendor Product Version
MongoDB Inc MongoDB Compass Affected: 1.35.0 , ≤ 1.42.0 (custom)
    cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.36.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3371",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T15:29:36.154092Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:29:49.075Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:12:06.560Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/COMPASS-7260"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.36.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "MongoDB Compass",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThanOrEqual": "1.42.0",
              "status": "affected",
              "version": "1.35.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-04-24T16:32:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-360",
              "description": "CWE-360: Trust of System Event Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-26T14:20:07.672Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/COMPASS-7260"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Insufficient validation of external input in Compass may enable MITM attacks",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2024-3371",
    "datePublished": "2024-04-24T16:32:07.178Z",
    "dateReserved": "2024-04-05T12:44:52.126Z",
    "dateUpdated": "2024-08-07T15:29:49.075Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-20334 (GCVE-0-2021-20334)

Vulnerability from nvd – Published: 2021-04-06 16:45 – Updated: 2024-09-17 01:25
VLAI?
Summary
A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows.
CWE
  • CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
Vendor Product Version
MongoDB Inc. MongoDB Compass Affected: 1.3.0 , < 1.x* (custom)
Create a notification for this product.
Credits
Hou JingYi (@hjy79425575)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:37:23.920Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/COMPASS-4510"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Windows"
          ],
          "product": "MongoDB Compass",
          "vendor": "MongoDB Inc.",
          "versions": [
            {
              "changes": [
                {
                  "at": "1.25.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "1.x*",
              "status": "affected",
              "version": "1.3.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Hou JingYi (@hjy79425575)"
        }
      ],
      "datePublic": "2021-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-06T16:45:20",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.mongodb.org/browse/COMPASS-4510"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Local privilege escalation in MongoDB Compass for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@mongodb.com",
          "DATE_PUBLIC": "2021-04-06T17:00:00.000Z",
          "ID": "CVE-2021-20334",
          "STATE": "PUBLIC",
          "TITLE": "Local privilege escalation in MongoDB Compass for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MongoDB Compass",
                      "version": {
                        "version_data": [
                          {
                            "platform": "Windows",
                            "version_affected": "\u003e=",
                            "version_name": "1.x",
                            "version_value": "1.3.0"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "\u003c",
                            "version_name": "1.x",
                            "version_value": "1.25.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MongoDB Inc."
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Hou JingYi (@hjy79425575)"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-269 Improper Privilege Management"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.mongodb.org/browse/COMPASS-4510",
              "refsource": "MISC",
              "url": "https://jira.mongodb.org/browse/COMPASS-4510"
            }
          ]
        },
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2021-20334",
    "datePublished": "2021-04-06T16:45:20.154946Z",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-09-17T01:25:58.140Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}