MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47483 | ejson shell parser in MongoDB Compass maybe bypassed |
Github GHSA |
GHSA-jxr4-4prv-mh83 | ejson shell parser in MongoDB Compass maybe bypassed |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://jira.mongodb.org/browse/COMPASS-7496 |
|
History
No history.
Status: PUBLISHED
Assigner: mongodb
Published:
Updated: 2024-08-01T21:33:05.431Z
Reserved: 2024-06-27T07:55:22.098Z
Link: CVE-2024-6376
Updated: 2024-08-01T21:33:05.431Z
Status : Modified
Published: 2024-07-01T15:15:17.673
Modified: 2024-11-21T09:49:31.510
Link: CVE-2024-6376
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA