CVE Vulnerabilities

CVE-2024-8207

Process Control

Published: Aug 27, 2024 | Modified: Aug 30, 2024
CVSS 3.x
6.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3.

Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue

Weakness

Executing commands or loading libraries from an untrusted source or in an untrusted environment can cause an application to execute malicious commands (and payloads) on behalf of an attacker.

Affected Software

Name Vendor Start Version End Version
Mongodb Mongodb 5.0.0 (including) 5.0.14 (excluding)
Mongodb Mongodb 6.0.0 (including) 6.0.3 (excluding)
Mongodb Mongodb 6.1.0 (including) 6.1.1 (excluding)
Mongodb Ubuntu trusty/esm *

Extended Description

Process control vulnerabilities of the first type occur when either data enters the application from an untrusted source and the data is used as part of a string representing a command that is executed by the application. By executing the command, the application gives an attacker a privilege or capability that the attacker would not otherwise have.

Potential Mitigations

References