Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN132 _____________________________________________________________________ DATE : 03/03/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running mongosh versions prior to 2.3.9. ===================================================================== https://jira.mongodb.org/browse/MONGOSH-2024 https://jira.mongodb.org/browse/MONGOSH-2025 https://jira.mongodb.org/browse/MONGOSH-2026 _____________________________________________________________________ MongoDB Shell may be susceptible to Control Character Injection via autocomplete Schedule Issue Undo Transition Closed Type: Bug Resolution: Fixed Priority: Major - P3 Fix Version/s: 2.3.9 Affects Version/s: None Component/s: None Labels: None CVE ID: CVE-2025-1691 Title: MongoDB Shell may be susceptible to Control Character Injection via autocomplete Description: The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using ‘tab’ to autocomplete text that is a prefix of the attacker’s prepared autocompletion. This issue affects mongosh versions prior to 2.3.9. The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker. CVSS Score: 7.6 – https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H List all affected product versions: mongosh versions prior to 2.3.9. CWE: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Required Configuration: The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker. _____________________________________________________________________ MongoDB Shell may be susceptible to control character injection via pasting Schedule Issue Undo Transition Closed Type: Bug Resolution: Fixed Priority: Major - P3 Fix Version/s: 2.3.9 Affects Version/s: None Component/s: None Labels: None Environment: OS: node.js / npm versions: Additional info: Assigned Teams: Developer Tools CVE ID: CVE-2025-1692 Title: MongoDB Shell may be susceptible to control character injection via pasting Description: The MongoDB Shell may be susceptible to control character injection where an attacker with control of the user’s clipboard could manipulate them to paste text into mongosh that evaluates arbitrary code. Control characters in the pasted text can be used to obfuscate malicious code. This issue affects mongosh versions prior to 2.3.9 CVSS Score: 6.3 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H List all affected product versions: mongosh versions prior to 2.3.9 CWE: CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences _____________________________________________________________________ MongoDB Shell may be susceptible to control character Injection via shell output Schedule Issue Undo Transition Closed Type: Bug Resolution: Fixed Priority: Major - P3 Fix Version/s: 2.3.9 Affects Version/s: None Component/s: None Labels: None Environment: OS: node.js / npm versions: Additional info: Assigned Teams: Developer Tools CVE ID: CVE-2025-1693 Title: MongoDB Shell may be susceptible to control character Injection via shell output Description: The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to originate from mongosh or the underlying operating system, potentially misleading users into executing unsafe actions. The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker. This issue affects mongosh versions prior to 2.3.9 CVSS Score: 3.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L Affected Product Versions: This issue affects mongosh versions prior to 2.3.9 CWE: CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences Required Configuration: The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker. ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================