Vulnerability Description
An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server to run attacker defined code as the user running the utility. This issue MongoDB Server v4.0 versions prior to 4.0.11; MongoDB Server v3.6 versions prior to 3.6.14 and MongoDB Server v3.4 prior to 3.4.22.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mongodb | Mongodb | >= 3.4.0, < 3.4.22 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://jira.mongodb.org/browse/SERVER-42233Issue TrackingVendor Advisory
- https://jira.mongodb.org/browse/SERVER-42233Issue TrackingVendor Advisory
FAQ
What is CVE-2019-2390?
CVE-2019-2390 is a vulnerability with a CVSS score of 8.2 (HIGH). An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server to run attacker defined cod...
How severe is CVE-2019-2390?
CVE-2019-2390 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-2390?
Check the references section above for vendor advisories and patch information. Affected products include: Mongodb Mongodb, Microsoft Windows.