Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-01947

Опубликовано: 07 мар. 2024
Источник: fstec
CVSS3: 8.8
CVSS2: 8.3
EPSS Низкий

Описание

Уязвимость системы управления базами данных MongoDB связана с ошибками процедуры подтверждения подлинности TLS сертификата. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, установить несанкционированное соединение к серверу MongoDB

Вендор

ООО «Ред Софт»
MongoDB Inc.
Percona LLC

Наименование ПО

РЕД ОС
MongoDB
Percona Server for MongoDB

Версия ПО

7.3 (РЕД ОС)
от 7.0.0 до 7.0.5 включительно (MongoDB)
от 6.0.0 до 6.0.13 влючительно (MongoDB)
от 5.0.0 до 5.0.24 включительно (MongoDB)
от 4.4.0 до 4.4.28 включительно (MongoDB)
до 7.0.7-4 (Percona Server for MongoDB)

Тип ПО

Операционная система
СУБД

Операционные системы и аппаратные платформы

ООО «Ред Софт» РЕД ОС 7.3

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 8,3)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,8)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://jira.mongodb.org/browse/SERVER-72839
https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024
https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024
https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024
https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024
Для РЕД ОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 32%
0.00123
Низкий

8.8 High

CVSS3

8.3 High

CVSS2

Связанные уязвимости

CVSS3: 8.8
redos
9 месяцев назад

Уязвимость mongodb-org

CVSS3: 8.8
ubuntu
больше 1 года назад

Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28. Required Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.

CVSS3: 8.8
nvd
больше 1 года назад

Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28. Required Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.

CVSS3: 8.8
debian
больше 1 года назад

Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Se ...

CVSS3: 8.8
github
больше 1 года назад

Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28. Required Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.

EPSS

Процентиль: 32%
0.00123
Низкий

8.8 High

CVSS3

8.3 High

CVSS2