PT-2012-40: Remote Code Execution in MongoDB Vulnerable softwareMongoDB Version: 2.x and earlierApplication link: http://www.mongodb.org/Severity levelSeverity level: High Impact: Remote Code Execution Access Vector: Remote CVSS v2: Base Score: 8.3 Vector: (AV:AN/AC:L/AU:N/C:C/I:C/A:C)CVE: not assignedSoftware descriptionMongoDB is an open-source document-centric database management system (DBMS) that do not require description of scheme of tables.Vulnerability descriptionThe specialists of the Positive Research center have detected a Remote Code Execution vulnerability in MongoDB application.If an attacker manages to call REST interface that is run on 28017 port by default, he or she can execute SSJS code.How to fixUpdate your software up to the latest versionAdvisory status 10.09.2012 - Vendor gets vulnerability details 13.02.2013 - Vendor releases fixed version and details 10.07.2013 - Public disclosureCreditsThe vulnerability was detected by Mikhail Firstov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2012-40 Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/