Vulnerability identifier: #VU42507
Vulnerability risk: Low
CVSSv3.1: 3.1 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
MongoDB
Server applications /
Database software
Vendor: MongoDB, Inc.
Description
The vulnerability allows a remote #AU# to read and manipulate data.
The find prototype in scripting/engine_v8.h in MongoDB 2.4.0 through 2.4.4 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and server crash) or possibly execute arbitrary code via an invalid RefDB object.
Mitigation
Install update from vendor's website.
Vulnerable software versions
MongoDB: 2.4.0 - 2.4.4
External links
http://blog.scrt.ch/2013/06/04/mongodb-rce-by-databasespraying/
http://secunia.com/advisories/54170
http://www.mongodb.org/about/alerts/
http://www.openwall.com/lists/oss-security/2013/07/30/10
http://jira.mongodb.org/browse/SERVER-9878
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.