logo

CVE-2021-20332 mongodb

Package

Manager: cargo
Name: mongodb
Vulnerable Version: >=1.0.0 <2.0.0-beta

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00133 pctl0.33679

Details

Exposure of Sensitive Information to an Unauthorized Actor in MongoDB Rust Driver Specific MongoDB Rust Driver versions can include credentials used by the connection pool to authenticate connections in the monitoring event that is emitted when the pool is created. The user's logging infrastructure could then potentially ingest these events and unexpectedly leak the credentials. Note that such monitoring is not enabled by default.

Metadata

Created: 2022-05-24T19:09:36Z
Modified: 2022-06-17T21:39:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-4rjr-3gj2-5crq/GHSA-4rjr-3gj2-5crq.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-4rjr-3gj2-5crq
Finding: F038
Auto approve: 1