5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.003 Low
EPSS
Percentile
70.8%
It may be possible to have an extremely long aggregation pipeline in
conjunction with a specific stage/operator and cause a stack overflow due
to the size of the stack frames used by that stage. If an attacker could
cause such an aggregation to occur, they could maliciously crash MongoDB in
a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior
to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and
MongoDB Server v4.2 versions prior to 4.2.16. Workaround: >= v4.2.16 users
and all v4.4 users can add the --setParameter
internalPipelineLengthLimit=50 instead of the default 1000 to mongod at
startup to prevent a crash.
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.003 Low
EPSS
Percentile
70.8%