We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-6376

ejson shell parser in MongoDB Compass maybe bypassed



Assignermongodb
Reserved2024-06-27
Published2024-07-01
Updated2024-08-01

Description

MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2



HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-20: Improper Input Validation

Product status

Default status
unaffected

Any version before 1.42.2
affected

References

https://jira.mongodb.org/browse/COMPASS-7496

cve.org CVE-2024-6376

nvd.nist.gov CVE-2024-6376

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.