FKIE_CVE-2025-6709
Vulnerability from fkie_nvd - Published: 2025-06-26 14:15 - Updated: 2025-09-15 14:09
Severity ?
Summary
The MongoDB Server is susceptible to a denial of service vulnerability due to improper handling of specific date values in JSON input when using OIDC authentication. This can be reproduced using the mongo shell to send a malicious JSON payload leading to an invariant failure and server crash. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.
The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.
References
| URL | Tags | ||
|---|---|---|---|
| cna@mongodb.com | https://jira.mongodb.org/browse/SERVER-106748 | Issue Tracking, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:-:*:*:*",
"matchCriteriaId": "70C1D1C7-0822-4382-AEBD-FED9490491A0",
"versionEndExcluding": "6.0.21",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:-:*:*:*",
"matchCriteriaId": "7E13B043-4482-48D1-9874-A6C210462A4A",
"versionEndExcluding": "7.0.17",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:-:*:*:*",
"matchCriteriaId": "564B8805-F93C-4F12-B29B-4EF3DD83CC9E",
"versionEndExcluding": "8.0.5",
"versionStartIncluding": "8.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MongoDB Server is susceptible to a denial of service vulnerability due to improper handling of specific date values in JSON input when using OIDC authentication. This can be reproduced using the mongo shell to send a malicious JSON payload leading to an invariant failure and server crash. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.\n\nThe same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating."
},
{
"lang": "es",
"value": "MongoDB Server es susceptible a una vulnerabilidad de denegaci\u00f3n de servicio debido al manejo incorrecto de valores de fecha espec\u00edficos en la entrada JSON al usar la autenticaci\u00f3n OIDC. Esto puede reproducirse mediante el shell de Mongo para enviar u payload JSON maliciosa, lo que provoca un fallo invariante y un bloqueo del servidor. Este problema afecta a las versiones 7.0 y 8.0 de MongoDB Server anteriores a la 7.0.17 y anteriores a la 8.0.5 de MongoDB Server. El mismo problema afecta a las versiones 6.0 y 6.0.21 de MongoDB Server, pero un atacante solo puede inducir la denegaci\u00f3n de servicio despu\u00e9s de la autenticaci\u00f3n."
}
],
"id": "CVE-2025-6709",
"lastModified": "2025-09-15T14:09:46.773",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "cna@mongodb.com",
"type": "Secondary"
}
]
},
"published": "2025-06-26T14:15:35.463",
"references": [
{
"source": "cna@mongodb.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://jira.mongodb.org/browse/SERVER-106748"
}
],
"sourceIdentifier": "cna@mongodb.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "cna@mongodb.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…