MongoDB Denial of Service Vulnerability - May17 (Linux)
2017-05-29T00:00:00
ID OPENVAS:1361412562310811058 Type openvas Reporter Copyright (C) 2017 Greenbone Networks GmbH Modified 2017-10-24T00:00:00
Description
The host is installed with MongoDB
and is prone to denial of service vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_mongodb_dos_vuln_may17_lin.nasl 7543 2017-10-24 11:02:02Z cfischer $
#
# MongoDB Denial of Service Vulnerability - May17 (Linux)
#
# Authors:
# Shakeel <bshakeel@secpod.com>
#
# Copyright:
# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:mongodb:mongodb";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.811058");
script_version("$Revision: 7543 $");
script_cve_id("CVE-2016-3104");
script_bugtraq_id(94929);
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_tag(name:"last_modification", value:"$Date: 2017-10-24 13:02:02 +0200 (Tue, 24 Oct 2017) $");
script_tag(name:"creation_date", value:"2017-05-29 14:40:50 +0530 (Mon, 29 May 2017)");
script_name("MongoDB Denial of Service Vulnerability - May17 (Linux)");
script_tag(name: "summary" , value:"The host is installed with MongoDB
and is prone to denial of service vulnerability.");
script_tag(name: "vuldetect" , value:"Get the installed version with the help of
detect NVT and check the version is vulnerable or not.");
script_tag(name: "insight" , value:"The flaw exists due to an error in 'in-memory'
database representation when authenticating against a non-existent database.");
script_tag(name: "impact" , value:"Successful exploitation will allow a remote
attacker to cause a denial of service. In very extreme cases the increase in
memory consumption may cause mongod to run out of memory and either terminate or
be terminated by the operating system's OOM killer.
Impact Level: Application");
script_tag(name: "affected" , value:"MongoDB version 2.4 on Linux");
script_tag(name: "solution" , value:"Upgrade to MongoDB version 2.6, or 3.0,
or later. For updates refer to http://www.mongodb.org");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_xref(name : "URL" , value : "https://jira.mongodb.org/browse/SERVER-24378");
script_copyright("Copyright (C) 2017 Greenbone Networks GmbH");
script_category(ACT_GATHER_INFO);
script_family("Databases");
script_dependencies("gb_mongodb_detect.nasl", "os_detection.nasl");
script_require_ports("Services/mongodb", 27017);
script_mandatory_keys("mongodb/installed", "Host/runs_unixoide");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
## Variable initialization
mbPort = "";
ver = "";
## Get the app port
if(!mbPort = get_app_port(cpe:CPE)){
exit(0);
}
## Get the app version
if(!mongodbversion = get_app_version(cpe:CPE, port:mbPort)){
exit(0);
}
##Replace '-' by '.' in version
if("-rc" >< mongodbversion){
mongodbversion = ereg_replace(pattern:"-", replace:".", string:mongodbversion);
}
## check the version
if(mongodbversion == "2.4.0")
{
report = report_fixed_ver(installed_version:mongodbversion, fixed_version:"2.6.0 or 3.0");
security_message(data:report, port:mbPort);
exit(0);
}
{"id": "OPENVAS:1361412562310811058", "bulletinFamily": "scanner", "title": "MongoDB Denial of Service Vulnerability - May17 (Linux)", "description": "The host is installed with MongoDB\n and is prone to denial of service vulnerability.", "published": "2017-05-29T00:00:00", "modified": "2017-10-24T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811058", "reporter": "Copyright (C) 2017 Greenbone Networks GmbH", "references": ["https://jira.mongodb.org/browse/SERVER-24378"], "cvelist": ["CVE-2016-3104"], "type": "openvas", "lastseen": "2017-10-25T14:49:13", "history": [{"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2016-3104"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "The host is installed with MongoDB\n and is prone to denial of service vulnerability.", "edition": 1, "enchantments": {}, "hash": "881c8799af947d9a2a777e48db95d445fcf70300f2134a02bef7f6770c7e911c", "hashmap": [{"hash": "a2323bbbec1269474bb5afba0147298f", "key": "reporter"}, {"hash": "724a69d383fe5b9cddf93df0f292362a", "key": "pluginID"}, {"hash": "9936a6fe1ea860596814c1e55925c9d6", "key": "references"}, {"hash": "664e1b3ed002ec61dd0849dda2019a26", "key": "description"}, {"hash": "b482dcf10d2dd06ee5e1811060c7c2b4", "key": "title"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "ea2ef9b0d095bf991f4973633b485340", "key": "naslFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "885ae5be0475d32b755c8e67652b6880", "key": "sourceData"}, {"hash": "1b2575fe6c434c8b233f6c9df1e280b4", "key": "cvelist"}, {"hash": "340ec01b1e7073c7ca2b069d54bb4c4c", "key": "href"}, {"hash": "8261c6758282db58ef5e36b4da39bde2", "key": "published"}, {"hash": "630d357e9d6ef3a6a18bcbc6c453a006", "key": "modified"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811058", "id": "OPENVAS:1361412562310811058", "lastseen": "2017-07-02T21:14:42", "modified": "2017-06-01T00:00:00", "naslFamily": "Databases", "objectVersion": "1.3", "pluginID": "1361412562310811058", "published": "2017-05-29T00:00:00", "references": ["https://jira.mongodb.org/browse/SERVER-24378"], "reporter": "Copyright (C) 2017 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mongodb_dos_vuln_may17_lin.nasl 6262 2017-06-01 11:47:33Z santu $\n#\n# MongoDB Denial of Service Vulnerability - May17 (Linux)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mongodb:mongodb\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811058\");\n script_version(\"$Revision: 6262 $\");\n script_cve_id(\"CVE-2016-3104\");\n script_bugtraq_id(94929);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-06-01 13:47:33 +0200 (Thu, 01 Jun 2017) $\");\n script_tag(name:\"creation_date\", value:\"2017-05-29 14:40:50 +0530 (Mon, 29 May 2017)\");\n script_name(\"MongoDB Denial of Service Vulnerability - May17 (Linux)\");\n\n script_tag(name: \"summary\" , value:\"The host is installed with MongoDB\n and is prone to denial of service vulnerability.\");\n\n script_tag(name: \"vuldetect\" , value:\"Get the installed version with the help of\n detect NVT and check the version is vulnerable or not.\");\n\n script_tag(name: \"insight\" , value:\"The flaw exists due to an error in 'in-memory'\n database representation when authenticating against a non-existent database.\");\n\n script_tag(name: \"impact\" , value:\"Successful exploitation will allow a remote\n attacker to cause a denial of service. In very extreme cases the increase in\n memory consumption may cause mongod to run out of memory and either terminate or\n be terminated by the operating system's OOM killer.\n\n Impact Level: Application\");\n\n script_tag(name: \"affected\" , value:\"MongoDB version 2.4 on Linux\");\n\n script_tag(name: \"solution\" , value:\"Upgrade to MongoDB version 2.6, or 3.0,\n or later. For updates refer to http://www.mongodb.org\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_xref(name : \"URL\" , value : \"https://jira.mongodb.org/browse/SERVER-24378\");\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Databases\");\n script_dependencies(\"gb_mongodb_detect.nasl\", \"os_detection.nasl\");\n script_require_ports(\"Services/mongodb\", 27017);\n script_mandatory_keys(\"mongodb/installed\", \"Host/runs_unixoide\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\n## Variable initialization\nmbPort = \"\";\nver = \"\";\n\n## exit, if its not Linux\nif(host_runs(\"Linux\") != \"yes\")exit(0);\n\n## Get the app port\nif(!mbPort = get_app_port(cpe:CPE)){\n exit(0);\n}\n\n## Get the app version\nif(!mongodbversion = get_app_version(cpe:CPE, port:mbPort)){\n exit(0);\n}\n\n##Replace '-' by '.' in version\nif(\"-rc\" >< mongodbversion){\n mongodbversion = ereg_replace(pattern:\"-\", replace:\".\", string:mongodbversion);\n}\n\n## check the version\nif(mongodbversion == \"2.4.0\")\n{\n report = report_fixed_ver(installed_version:mongodbversion, fixed_version:\"2.6.0 or 3.0\");\n security_message(data:report, port:mbPort);\n exit(0);\n}\n", "title": "MongoDB Denial of Service Vulnerability - May17 (Linux)", "type": "openvas", "viewCount": 0}, "differentElements": ["modified", "sourceData"], "edition": 1, "lastseen": "2017-07-02T21:14:42"}], "edition": 2, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "1b2575fe6c434c8b233f6c9df1e280b4"}, {"key": "cvss", "hash": "84813b1457b92d6ba1174abffbb83a2f"}, {"key": "description", "hash": "664e1b3ed002ec61dd0849dda2019a26"}, {"key": "href", "hash": "340ec01b1e7073c7ca2b069d54bb4c4c"}, {"key": "modified", "hash": "c5bb34af05c207ad0795b24b339835fb"}, {"key": "naslFamily", "hash": "ea2ef9b0d095bf991f4973633b485340"}, {"key": "pluginID", "hash": "724a69d383fe5b9cddf93df0f292362a"}, {"key": "published", "hash": "8261c6758282db58ef5e36b4da39bde2"}, {"key": "references", "hash": "9936a6fe1ea860596814c1e55925c9d6"}, {"key": "reporter", "hash": "a2323bbbec1269474bb5afba0147298f"}, {"key": "sourceData", "hash": "8b82c607dc842562ed21ada3bf2bb3de"}, {"key": "title", "hash": "b482dcf10d2dd06ee5e1811060c7c2b4"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "hash": "dce6983c010291dcdf6dfa181ae24a0f2f30e985cd2542b8a88d8cee68f3fc09", "viewCount": 0, "enchantments": {"vulnersScore": 4.7}, "objectVersion": "1.3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mongodb_dos_vuln_may17_lin.nasl 7543 2017-10-24 11:02:02Z cfischer $\n#\n# MongoDB Denial of Service Vulnerability - May17 (Linux)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mongodb:mongodb\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811058\");\n script_version(\"$Revision: 7543 $\");\n script_cve_id(\"CVE-2016-3104\");\n script_bugtraq_id(94929);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-10-24 13:02:02 +0200 (Tue, 24 Oct 2017) $\");\n script_tag(name:\"creation_date\", value:\"2017-05-29 14:40:50 +0530 (Mon, 29 May 2017)\");\n script_name(\"MongoDB Denial of Service Vulnerability - May17 (Linux)\");\n\n script_tag(name: \"summary\" , value:\"The host is installed with MongoDB\n and is prone to denial of service vulnerability.\");\n\n script_tag(name: \"vuldetect\" , value:\"Get the installed version with the help of\n detect NVT and check the version is vulnerable or not.\");\n\n script_tag(name: \"insight\" , value:\"The flaw exists due to an error in 'in-memory'\n database representation when authenticating against a non-existent database.\");\n\n script_tag(name: \"impact\" , value:\"Successful exploitation will allow a remote\n attacker to cause a denial of service. In very extreme cases the increase in\n memory consumption may cause mongod to run out of memory and either terminate or\n be terminated by the operating system's OOM killer.\n\n Impact Level: Application\");\n\n script_tag(name: \"affected\" , value:\"MongoDB version 2.4 on Linux\");\n\n script_tag(name: \"solution\" , value:\"Upgrade to MongoDB version 2.6, or 3.0,\n or later. For updates refer to http://www.mongodb.org\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_xref(name : \"URL\" , value : \"https://jira.mongodb.org/browse/SERVER-24378\");\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Databases\");\n script_dependencies(\"gb_mongodb_detect.nasl\", \"os_detection.nasl\");\n script_require_ports(\"Services/mongodb\", 27017);\n script_mandatory_keys(\"mongodb/installed\", \"Host/runs_unixoide\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\n## Variable initialization\nmbPort = \"\";\nver = \"\";\n\n## Get the app port\nif(!mbPort = get_app_port(cpe:CPE)){\n exit(0);\n}\n\n## Get the app version\nif(!mongodbversion = get_app_version(cpe:CPE, port:mbPort)){\n exit(0);\n}\n\n##Replace '-' by '.' in version\nif(\"-rc\" >< mongodbversion){\n mongodbversion = ereg_replace(pattern:\"-\", replace:\".\", string:mongodbversion);\n}\n\n## check the version\nif(mongodbversion == \"2.4.0\")\n{\n report = report_fixed_ver(installed_version:mongodbversion, fixed_version:\"2.6.0 or 3.0\");\n security_message(data:report, port:mbPort);\n exit(0);\n}\n", "naslFamily": "Databases", "pluginID": "1361412562310811058"}
{"result": {"cve": [{"id": "CVE-2016-3104", "type": "cve", "title": "CVE-2016-3104", "description": "mongod in MongoDB 2.6, when using 2.4-style users, and 2.4 allow remote attackers to cause a denial of service (memory consumption and process termination) by leveraging in-memory database representation when authenticating against a non-existent database.", "published": "2017-04-14T14:59:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3104", "cvelist": ["CVE-2016-3104"], "lastseen": "2017-04-23T07:37:10"}], "openvas": [{"id": "OPENVAS:1361412562310811057", "type": "openvas", "title": "MongoDB Denial of Service Vulnerability - May17 (Windows)", "description": "The host is installed with MongoDB\n and is prone to denial of service vulnerability.", "published": "2017-05-29T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811057", "cvelist": ["CVE-2016-3104"], "lastseen": "2017-10-25T14:48:39"}]}}