
Cloud Vulnerability DB
A community-led vulnerabilities database
MongoDB Compass, a graphical user interface for querying and analyzing MongoDB data, has been found to contain a critical security vulnerability (CVE-2024-6376). The vulnerability stems from insufficient sandbox protection settings within the ejson shell parser used in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2, with the National Vulnerability Database (NVD) assigning it a critical CVSS score of 9.8 (NVD, SecurityOnline).
The vulnerability is classified as a code injection flaw (CWE-94) due to improper control of code generation and improper input validation (CWE-20). The NVD has assigned it a CVSS v3.1 base score of 9.8 (CRITICAL) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, while MongoDB's internal assessment rates it at 7.0 (HIGH) with vector CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD, MongoDB Issue).
The vulnerability could allow malicious actors to execute arbitrary code on systems running affected versions of the software. Given MongoDB Compass's widespread use across various industries, the potential impact includes data loss, corruption, and unauthorized access to systems (SecurityOnline).
MongoDB has addressed this vulnerability by releasing version 1.42.2 of Compass. Users are strongly advised to update to this latest version immediately to protect their systems from potential attacks (MongoDB Issue, SecurityOnline).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."