First published: Mon Nov 23 2020(Updated: )
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which use $lookup and collations. This issue affects MongoDB Server v4.2 versions prior to 4.2.1; MongoDB Server v4.0 versions prior to 4.0.13 and MongoDB Server v3.6 versions prior to 3.6.15.
Credit: cna@mongodb.com cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB MongoDB | >=3.6.0<3.6.15 | |
MongoDB MongoDB | >=4.0.0<4.0.13 | |
MongoDB MongoDB | >=4.2.0<4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2393 is a vulnerability that allows a user with database query authorization to trigger a denial of service attack by issuing specially crafted queries in MongoDB Server.
CVE-2019-2393 affects MongoDB Server v4.2 versions prior to 4.2.1, v4.0 versions prior to 4.0.13, and v3.6 versions prior to 3.6.15.
CVE-2019-2393 allows a user with database query authorization to cause a denial of service by using $lookup and collations in specially crafted queries.
CVE-2019-2393 has a severity rating of 6.5 (medium).
To fix CVE-2019-2393, MongoDB Server users should upgrade to version 4.2.1, 4.0.13, or 3.6.15 depending on their current version.