First published: Mon Jul 01 2024(Updated: )
MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2
Credit: cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB Compass | <1.42.2 | |
npm/@mongodb-js/connection-form | <1.20.1 | 1.20.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6376 is classified as a code injection vulnerability with a critical severity level due to the risk of executing malicious code.
To fix CVE-2024-6376, upgrade MongoDB Compass to version 1.42.2 or later.
CVE-2024-6376 affects all versions of MongoDB Compass prior to version 1.42.2.
CVE-2024-6376 is caused by insufficient sandbox protection settings in MongoDB Compass combined with the use of the ejson shell parser.
CVE-2024-6376 is a local vulnerability, as it requires access to the MongoDB Compass application to exploit.