logo

CVE-2024-5629 pymongo

Package

Manager: pip
Name: pymongo
Vulnerable Version: >=0 <4.6.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00069 pctl0.21751

Details

PyMongo Out-of-bounds Read in the bson module Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte.

Metadata

Created: 2024-06-05T15:30:39Z
Modified: 2024-06-18T19:15:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-m87m-mmvp-v9qm/GHSA-m87m-mmvp-v9qm.json
CWE IDs: ["CWE-125"]
Alternative ID: GHSA-m87m-mmvp-v9qm
Finding: F111
Auto approve: 1