MongoDB < 2.4.5 / 2.5.1 Multiple Vulnerabilities

medium Nessus Plugin ID 67243

Synopsis

The remote database server is affected by multiple vulnerabilities.

Description

The version of the remote MongoDB server is a version prior to version 2.4.5 / 2.5.1. It is, therefore, potentially affected by the following vulnerabilities :

- A remote attacker can gain elevated privileges when authenticating as the internal __system user name for arbitrary databases. (CVE-2013-4650)

- The JavaScript engine is vulnerable to a flaw that could be triggered remotely to cause a segmentation fault, or potentially arbitrary code execution.
(CVE-2013-3969)

Solution

Upgrade to MongoDB 2.4.5 / 2.5.1 or later.

See Also

http://www.nessus.org/u?6dfa8c8f

https://jira.mongodb.org/browse/SERVER-9983

https://jira.mongodb.org/browse/SERVER-9878

http://www.nessus.org/u?96e66060

http://blog.scrt.ch/2013/06/04/mongodb-rce-by-databasespraying/

Plugin Details

Severity: Medium

ID: 67243

File Name: mongodb_2_5_1.nasl

Version: 1.11

Type: remote

Family: Databases

Published: 7/11/2013

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mongodb:mongodb

Required KB Items: Settings/ParanoidReport, Services/mongodb

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/5/2013

Vulnerability Publication Date: 6/4/2013

Exploitable With

Core Impact

Reference Information

CVE: CVE-2013-3969, CVE-2013-4650

BID: 61007, 61309