CVE Vulnerabilities

CVE-2019-2386

Insufficient Session Expiration

Published: Aug 06, 2019 | Modified: Jan 23, 2024
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6 MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated users session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones. This issue affects MongoDB Server v4.0 versions prior to 4.0.9; MongoDB Server v3.6 versions prior to 3.6.13 and MongoDB Server v3.4 versions prior to 3.4.22.

Workaround: After deleting one or more users, restart any nodes which may have had active user authorization sessions.

Refrain from creating user accounts with the same name as previously deleted accounts.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Mongodb Mongodb 3.4.0 (including) 3.4.22 (excluding)
Mongodb Mongodb 3.6.0 (including) 3.6.13 (excluding)
Mongodb Mongodb 4.0.0 (including) 4.0.9 (excluding)

Potential Mitigations

References