logo

CVE-2024-6376 @mongodb-js/connection-form

Package

Manager: npm
Name: @mongodb-js/connection-form
Vulnerable Version: >=0 <1.20.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00381 pctl0.58735

Details

ejson shell parser in MongoDB Compass maybe bypassed MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2.

Metadata

Created: 2024-07-01T15:32:47Z
Modified: 2025-02-27T20:59:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-jxr4-4prv-mh83/GHSA-jxr4-4prv-mh83.json
CWE IDs: ["CWE-20", "CWE-94"]
Alternative ID: GHSA-jxr4-4prv-mh83
Finding: F184
Auto approve: 1