First published: Thu Oct 10 2019(Updated: )
Automattic Mongoose through 5.7.4 allows attackers to bypass access control (in some applications) because any query object with a _bsontype attribute is ignored. For example, adding "_bsontype":"a" can sometimes interfere with a query filter. NOTE: this CVE is about Mongoose's failure to work around this _bsontype special case that exists in older versions of the bson parser (aka the mongodb/js-bson project).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/mongoose | <4.13.21 | 4.13.21 |
npm/mongoose | >=5.0.0<5.7.5 | 5.7.5 |
Mongoose | <=5.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17426 is classified as a medium severity vulnerability due to its potential to allow unauthorized access in certain applications.
To fix CVE-2019-17426, upgrade Mongoose to version 5.7.5 or later, or to version 4.13.21.
CVE-2019-17426 affects Mongoose versions up to and including 5.7.4.
CVE-2019-17426 allows attackers to bypass access control measures by manipulating query filters using specific attributes.
Yes, CVE-2019-17426 is fixed in Mongoose version 5.7.5 and version 4.13.21.