Permissions, Privileges, and Access Controls in MongoDB - CVE-2013-4650

 

Permissions, Privileges, and Access Controls in MongoDB - CVE-2013-4650

Published: July 4, 2013 / Updated: August 11, 2020


Vulnerability identifier: #VU42755
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2013-4650
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: MongoDB, Inc.
Affected software:
MongoDB

Detailed vulnerability description

The vulnerability allows a remote #AU# to read and manipulate data.

MongoDB 2.4.x before 2.4.5 and 2.5.x before 2.5.1 allows remote authenticated users to obtain internal system privileges by leveraging a username of __system in an arbitrary database.


How to mitigate CVE-2013-4650

Install update from vendor's website.

Sources