First published: Wed Apr 24 2024(Updated: )
MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.
Credit: cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB Compass | >=1.35.0<=1.42.0 | |
MongoDB Compass | >=1.35.0<1.42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3371 is classified as a high severity vulnerability due to the potential for data disclosure and user impersonation.
To fix CVE-2024-3371, upgrade MongoDB Compass to version 1.42.1 or later, where the vulnerability has been addressed.
CVE-2024-3371 affects MongoDB Compass versions 1.35.0 through 1.42.0.
CVE-2024-3371 may allow attackers to impersonate users and access sensitive data due to insufficient input validation.
While upgrading is the recommended solution, reviewing input validation processes may help mitigate some risk associated with CVE-2024-3371.