C Driver MongoDB C Driver

Do you want an email whenever new security vulnerabilities are reported in MongoDB C Driver?

By the Year

In 2024 there have been 1 vulnerability in MongoDB C Driver with an average score of 7.5 out of ten. Last year C Driver had 2 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in C Driver in 2024 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2024 is greater by 0.15.

Year Vulnerabilities Average Score
2024 1 7.50
2023 2 7.35
2022 0 0.00
2021 1 4.90
2020 1 5.50
2019 0 0.00
2018 0 0.00

It may take a day or so for new C Driver vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent MongoDB C Driver Security Vulnerabilities

When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e

CVE-2023-0437 7.5 - High - January 12, 2024

When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.

Infinite Loop

Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application

CVE-2021-32050 7.5 - High - August 29, 2023

Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).

Insertion of Sensitive Information into Log File

Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed

CVE-2022-48282 7.2 - High - February 21, 2023

Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0 Following configuration must be true for the vulnerability to be applicable: * Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND * Application must be running on a Windows host using the full .NET Framework, not .NET Core AND * Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND * Malicious attacker must have unrestricted insert access to target database to add a _t discriminator."Following configuration must be true for the vulnerability to be applicable

Marshaling, Unmarshaling

Specific versions of the MongoDB C# Driver may erroneously publish events containing authentication-related data to a command listener configured by an application

CVE-2021-20331 4.9 - Medium - May 13, 2021

Specific versions of the MongoDB C# Driver may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when commands such as "saslStart", "saslContinue", "isMaster", "createUser", and "updateUser" are executed. Without due care, an application may inadvertently expose this authenticated-related information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C# Driver v2.12 versions prior to and including 2.12.1.

Information Disclosure

bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values

CVE-2020-12135 5.5 - Medium - April 24, 2020

bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.

Integer Overflow or Wraparound

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Whoopsieproject Whoopsie or by MongoDB? Click the Watch button to subscribe.

MongoDB
Vendor

subscribe