First published: Mon Nov 23 2020(Updated: )
Specially crafted API calls may allow an authenticated user who holds Organization Owner privilege to obtain an API key with Global Role privilege. This issue affects MongoDB Ops Manager v4.2 versions 4.2.0-4.2.17, v4.3 versions 4.3.0-4.3.9 and v4.4 versions 4.4.0-4.4.2.
Credit: cna@mongodb.com cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB Ops Manager | >=4.2.0<=4.2.17 | |
MongoDB Ops Manager | >=4.3.0<=4.3.9 | |
MongoDB Ops Manager | >=4.4.0<=4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7927 is a vulnerability in MongoDB Ops Manager that allows an authenticated user with Organization Owner privilege to obtain an API key with Global Role privilege.
CVE-2020-7927 affects MongoDB Ops Manager v4.2 versions 4.2.0-4.2.17, v4.3 versions 4.3.0-4.3.9, and v4.4 versions 4.4.0-4.4.2.
The severity of CVE-2020-7927 is high with a CVSS score of 6.5.
To fix CVE-2020-7927, you should update MongoDB Ops Manager to version 4.4.3 or later.
You can find more information about CVE-2020-7927 in the MongoDB Ops Manager release notes: https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-4-3