CVE-2024-6376 – @mongodb-js/connection-form
Package
Manager: npm
Name: @mongodb-js/connection-form
Vulnerable Version: >=0 <1.20.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00381 pctl0.58735
Details
ejson shell parser in MongoDB Compass maybe bypassed MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2.
Metadata
Created: 2024-07-01T15:32:47Z
Modified: 2025-02-27T20:59:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-jxr4-4prv-mh83/GHSA-jxr4-4prv-mh83.json
CWE IDs: ["CWE-20", "CWE-94"]
Alternative ID: GHSA-jxr4-4prv-mh83
Finding: F184
Auto approve: 1