First published: Wed May 06 2020(Updated: )
Improper serialization of internal state in the authorization subsystem in MongoDB Server's authorization subsystem permits a user with valid credentials to bypass IP whitelisting protection mechanisms following administrative action. This issue affects MongoDB Server v4.2 versions prior to 4.2.3; MongoDB Server v4.0 versions prior to 4.0.15; MongoDB Server v4.3 versions prior to 4.3.3and MongoDB Server v3.6 versions prior to 3.6.18.
Credit: cna@mongodb.com cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB MongoDB | >=3.6.0<3.6.18 | |
MongoDB MongoDB | >=4.0.0<4.0.15 | |
MongoDB MongoDB | >=4.2.0<4.2.3 | |
MongoDB MongoDB | >=4.3.0<4.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7921 refers to an improper serialization vulnerability in the authorization subsystem of MongoDB Server.
CVE-2020-7921 allows a user with valid credentials to bypass IP whitelisting protection mechanisms in MongoDB Server.
Versions 3.6.0 to 3.6.18, 4.0.0 to 4.0.15, 4.2.0 to 4.2.3, and 4.3.0 to 4.3.3 of MongoDB Server are affected by CVE-2020-7921.
CVE-2020-7921 has a severity rating of 5.3, which is considered medium.
It is recommended to update MongoDB Server to a version that is not affected by CVE-2020-7921 or apply any patches or updates provided by MongoDB Inc.