In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3.
Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue
Executing commands or loading libraries from an untrusted source or in an untrusted environment can cause an application to execute malicious commands (and payloads) on behalf of an attacker.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mongodb | Mongodb | 5.0.0 (including) | 5.0.14 (excluding) |
Mongodb | Mongodb | 6.0.0 (including) | 6.0.3 (excluding) |
Mongodb | Mongodb | 6.1.0 (including) | 6.1.1 (excluding) |
Mongodb | Ubuntu | trusty/esm | * |
Process control vulnerabilities of the first type occur when either data enters the application from an untrusted source and the data is used as part of a string representing a command that is executed by the application. By executing the command, the application gives an attacker a privilege or capability that the attacker would not otherwise have.