Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310151888
HistoryMar 08, 2024 - 12:00 a.m.

MongoDB Certificate Validation Vulnerability (SERVER-72839) - Linux

2024-03-0800:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
7
mongodb
certificate validation
vulnerability
linux
tls
security
connection
configuration
version
update

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.5%

MongoDB is prone to a certificate validation vulnerability.

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:mongodb:mongodb";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.151888");
  script_version("2024-03-08T15:37:10+0000");
  script_tag(name:"last_modification", value:"2024-03-08 15:37:10 +0000 (Fri, 08 Mar 2024)");
  script_tag(name:"creation_date", value:"2024-03-08 06:35:22 +0000 (Fri, 08 Mar 2024)");
  script_tag(name:"cvss_base", value:"8.3");
  script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:N/C:C/I:C/A:C");

  script_cve_id("CVE-2024-1351");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("MongoDB Certificate Validation Vulnerability (SERVER-72839) - Linux");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("Databases");
  script_dependencies("gb_mongodb_detect.nasl", "os_detection.nasl");
  script_mandatory_keys("mongodb/installed", "Host/runs_unixoide");

  script_tag(name:"summary", value:"MongoDB is prone to a certificate validation vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Under certain configurations of --tlsCAFile and tls.CAFile,
  MongoDB Server may skip peer certificate validation which may result in untrusted connections to
  succeed. This may effectively reduce the security guarantees provided by TLS and open connections
  that should have been closed due to failing certificate validation.

  Required Configuration: A server process will allow incoming connections to skip peer certificate
  validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS,
  preferTLS, or requireTLS) and without a net.tls.CAFile configured.");

  script_tag(name:"affected", value:"MongoDB version 3.2.6 through 4.4.28, 5.x through 5.0.24,
  6.x through 6.0.13 and 7.x through 7.0.5.");

  script_tag(name:"solution", value:"Update to version 4.4.29, 5.0.25, 6.0.14, 7.0.6 or later.");

  script_xref(name:"URL", value:"https://jira.mongodb.org/browse/SERVER-72839");
  script_xref(name:"URL", value:"https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024");
  script_xref(name:"URL", value:"https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024");
  script_xref(name:"URL", value:"https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024");
  script_xref(name:"URL", value:"https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!version = get_app_version(cpe: CPE, port: port))
  exit(0);

if (version_in_range_exclusive(version: version, test_version_lo: "3.2.6", test_version_up: "4.4.29")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "4.4.29");
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range_exclusive(version: version, test_version_lo: "5.0", test_version_up: "5.0.25")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "5.0.25");
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range_exclusive(version: version, test_version_lo: "6.0", test_version_up: "6.0.14")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "6.0.14");
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range_exclusive(version: version, test_version_lo: "7.0", test_version_up: "7.0.6")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "7.0.6");
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.5%