First published: Tue Mar 30 2021(Updated: )
mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mongo-express Project Mongo-express | <=0.54.0 |
https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-24391 is critical with a CVSS score of 9.8.
CVE-2020-24391 affects mongo-express versions up to and including 0.54.0.
The remedy for CVE-2020-24391 in mongo-express is to update to version 2.0.0 or later.
The affected package for CVE-2020-24391 is `mongodb-query-parser`.
Yes, you can find references for CVE-2020-24391 on the NIST National Vulnerability Database (NVD), GitHub issues, and GitHub commits.