Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", "matchCriteriaId": "94A44EAA-983E-4625-A35D-EE2FE116B3B5", "versionEndIncluding": "2.3.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FBA2303-8E19-415F-BD7C-B348DE0EC478", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "92948672-3F39-4675-BFB1-4ACACD078CC6", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7590AB3-4433-4589-9575-647015A5DA24", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC4562CE-83D2-422C-AB94-CB0EFABC2CF8", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1B3AD0E-11F2-477E-9D18-B6A609A4C652", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA0BC4E1-4BF4-4486-829C-25AA0D01B8D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C36D5752-589C-4323-8515-073DDF89DB9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F63D8331-B0E9-4571-A74C-C13D3D4A13C5", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "AB8EA4FF-62DB-40DA-833E-E43F64C79EC2", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "253B057C-981D-4A8C-B81E-96ACD8C5AF86", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3291EEA9-7A79-417D-98FD-1350B4A456D2", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9FE04CE4-8D9F-4C56-802A-2F67DF884CDC", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "02C47DC1-A725-460C-9EBB-5DAA616DF374", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F23FE-3AAF-4E29-AF89-C6365E839119", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "37D967E7-87F2-450C-A593-0FEE0F2A9A94", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C6CD236-537A-4144-ACDF-5242D11AE34A", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "BE7C828E-47B2-46AB-90F1-FD9682188E45", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "F2EDBDF4-2F0A-409A-A881-E94AC0A77A85", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "185A7242-0393-4DE1-B781-7D3FA68750A4", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "98387C88-695E-4948-9FB4-E3D5234647E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7B093A56-8E36-47C7-BE3C-F72FAC5CEC14", "vulnerable": true}, {"criteria": "cpe:2.3:a:mongodb:mongodb:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0A29408-7294-4A11-A77D-9CFCF9FD54AB", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The default configuration for MongoDB before 2.3.2 does not validate objects, which allows remote authenticated users to cause a denial of service (crash) or read system memory via a crafted BSON object in the column name in an insert command, which triggers a buffer over-read."}, {"lang": "es", "value": "La configuraci\u00f3n por defecto para MongoDB anterior a 2.3.2 no valida objetos, lo que permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda) o leer la memoria del sistema a trav\u00e9s de un objeto BSON manipulado en el nombre de columna en un comando \"insert\", lo que provoca una sobrelectura de buffer."}], "id": "CVE-2012-6619", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-03-06T15:55:28.737", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://blog.ptsecurity.com/2012/11/attacking-mongodb.html"}, {"source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-0230.html"}, {"source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-0440.html"}, {"source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/01/07/13"}, {"source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/01/07/2"}, {"source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/01/08/9"}, {"source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049748"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Vendor Advisory"], "url": "https://jira.mongodb.org/browse/SERVER-7769"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://blog.ptsecurity.com/2012/11/attacking-mongodb.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0230.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0440.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/01/07/13"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/01/07/2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/01/08/9"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049748"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"], "url": "https://jira.mongodb.org/browse/SERVER-7769"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}