mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.
References
Link | Resource |
---|---|
https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a | Patch Third Party Advisory |
https://github.com/mongodb-js/query-parser/issues/16 | Third Party Advisory |
https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a | Patch Third Party Advisory |
https://github.com/mongodb-js/query-parser/issues/16 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a - Patch, Third Party Advisory | |
References | () https://github.com/mongodb-js/query-parser/issues/16 - Third Party Advisory |
Information
Published : 2021-03-30 21:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24391
Mitre link : CVE-2020-24391
CVE.ORG link : CVE-2020-24391
JSON object : View
Products Affected
mongo-express_project
- mongo-express
CWE