First published: Fri Aug 30 2019(Updated: )
An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server to run attacker defined code as the user running the utility. This issue MongoDB Server v4.0 versions prior to 4.0.11; MongoDB Server v3.6 versions prior to 3.6.14 and MongoDB Server v3.4 prior to 3.4.22.
Credit: cna@mongodb.com cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
MongoDB MongoDB | >=3.4.0<3.4.22 | |
MongoDB MongoDB | >=3.6.0<3.6.14 | |
MongoDB MongoDB | >=4.0.0<4.0.11 | |
Microsoft Windows | ||
MongoDB MongoDB | >=3.4.0<3.4.22 | |
MongoDB MongoDB | >=3.6.0<3.6.14 | |
MongoDB MongoDB | >=4.0.0<4.0.11 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-2390 is high with a CVSS score of 7.8.
CVE-2019-2390 is a vulnerability that allows an unprivileged user or program on Microsoft Windows to run attacker-defined code as the user running the utility programs shipped with MongoDB server.
CVE-2019-2390 affects MongoDB Server versions 3.4.0 to 3.4.22, 3.6.0 to 3.6.14, and 4.0.0 to 4.0.11.
To fix CVE-2019-2390, it is recommended to upgrade MongoDB Server to a version that is not affected by the vulnerability.
You can find more information about CVE-2019-2390 at the following reference: https://jira.mongodb.org/browse/SERVER-42233.