Information Exposure Through Log Files Affecting mongo-c-driver package, versions <1.18.0-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.2% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure Through Log Files vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-MONGOCDRIVER-5880538
  • published4 Sept 2023
  • disclosed29 Aug 2023

Introduced: 29 Aug 2023

CVE-2021-32050  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade Debian:13 mongo-c-driver to version 1.18.0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mongo-c-driver package and not the mongo-c-driver package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.

Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).

This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).

CVSS Scores

version 3.1