=========================================================================== ZMCIRT Vulnerability Bulletin ZMC-2021.08.26.0900 MongoDB: Increased privileges - Existing account 26th August 2021 =========================================================================== Product: MongoDB Publisher: Ubuntu Operating System: Ubuntu UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Increased Privileges -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-2386 Original Bulletin: https://ubuntu.com/security/notices/USN-5052-1 Comment: This advisory references vulnerabilities in products which run on platforms other than Ubuntu. It is recommended that administrators running MongoDB check for an updated version of the software for their operating system. USN-5052-1: MongoDB vulnerability 26 August 2021 MongoDB could provide unintended access. Releases o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS Packages o mongodb - Document-oriented database Details MongoDB would fail to properly invalidate existing sessions for deleted users. This could allow a remote authenticated attacker to gain elevated privileges if their user account was recreated with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o mongodb-server - 1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.2 o mongodb-clients - 1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.2 o mongodb-server-core - 1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.2 Ubuntu 18.04 o mongodb-server - 1:3.6.3-0ubuntu1.3 o mongodb-clients - 1:3.6.3-0ubuntu1.3 o mongodb-server-core - 1:3.6.3-0ubuntu1.3 In general, a standard system update will make all the necessary changes. References o CVE-2019-2386 ZMCIRT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. ZMCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Internet Email: report@cirt.zm Telephone: 7070 ZMCIRT personnel answer during Zambian business hours which are 8am to 5pm. On call after hours for member emergencies only. ===========================================================================
Copyright @2023 ZAMBIA CIRT