CVE-2024-5629 – pymongo
Package
Manager: pip
Name: pymongo
Vulnerable Version: >=0 <4.6.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00069 pctl0.21751
Details
PyMongo Out-of-bounds Read in the bson module Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte.
Metadata
Created: 2024-06-05T15:30:39Z
Modified: 2024-06-18T19:15:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-m87m-mmvp-v9qm/GHSA-m87m-mmvp-v9qm.json
CWE IDs: ["CWE-125"]
Alternative ID: GHSA-m87m-mmvp-v9qm
Finding: F111
Auto approve: 1