It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16. Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mongodb

Published: 2022-04-12T00:00:00

Updated: 2024-08-15T17:07:34.494Z

Reserved: 2021-05-05T00:00:00

Link: CVE-2021-32040

cve-icon Vulnrichment

Updated: 2024-08-03T23:17:29.135Z

cve-icon NVD

Status : Modified

Published: 2022-04-12T15:15:07.707

Modified: 2024-02-23T16:15:46.120

Link: CVE-2021-32040

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-04-12T00:00:00Z

Links: CVE-2021-32040 - Bugzilla