Описание
Specific MongoDB Rust Driver versions can include credentials used by the connection pool to authenticate connections in the monitoring event that is emitted when the pool is created. The user's logging infrastructure could then potentially ingest these events and unexpectedly leak the credentials. Note that such monitoring is not enabled by default. This issue affects MongoDB Rust Driver version 2.0.0-alpha, MongoDB Rust Driver version 2.0.0-alpha1 and MongoDB Rust Driver version 1.0.0 through to and including 1.2.1
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.0.0 (включая) до 1.2.1 (включая)
Одно из
cpe:2.3:a:mongodb:rust_driver:*:*:*:*:*:mongodb:*:*
cpe:2.3:a:mongodb:rust_driver:2.0.0:alpha:*:*:*:mongodb:*:*
cpe:2.3:a:mongodb:rust_driver:2.0.0:alpha1:*:*:*:mongodb:*:*
EPSS
Процентиль: 33%
0.00133
Низкий
4.2 Medium
CVSS3
4.4 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-200
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 4.4
github
больше 3 лет назад
Exposure of Sensitive Information to an Unauthorized Actor in MongoDB Rust Driver
EPSS
Процентиль: 33%
0.00133
Низкий
4.2 Medium
CVSS3
4.4 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-200
NVD-CWE-noinfo