PT-2012-40: Remote Code Execution in MongoDB

Vulnerable software

MongoDB
Version: 2.x and earlier

Application link:
http://www.mongodb.org/

Severity level

Severity level: High
Impact: Remote Code Execution
Access Vector: Remote  

CVSS v2:
Base Score: 8.3
Vector: (AV:AN/AC:L/AU:N/C:C/I:C/A:C)

CVE: not assigned

Software description

MongoDB is an open-source document-centric database management system (DBMS) that do not require description of scheme of tables.

Vulnerability description

The specialists of the Positive Research center have detected a Remote Code Execution vulnerability in MongoDB application.

If an attacker manages to call REST interface that is run on 28017 port by default, he or she can execute SSJS code.

How to fix

Update your software up to the latest version

Advisory status

10.09.2012 - Vendor gets vulnerability details
13.02.2013 - Vendor releases fixed version and details
10.07.2013 - Public disclosure

Credits

The vulnerability was detected by Mikhail Firstov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2012-40

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/