PT-2012-58: Arbitrary Server Memory Chunks Reading in MongoDB
(PT-2012-58) Positive Technologies Security Advisory
Arbitrary Server Memory Chunks Reading in MongoDB
Version: 2.x and earlier
Severity level: Medium
Impact: Arbitrary Server Memory Chunks Reading
Access Vector: Local
Base Score: 4.4
CVE: not assigned
MongoDB is an open-source document-centric database management system (DBMS) that do not require description of scheme of tables.
The specialists of the Positive Research center have detected "Columns Overwriting and Adding" vulnerability in MongoDB application.
Due to improper handling of the length of the BSON document in the column name in the insert command, a specially crafted entry containing Base64 encoded server memory chunks can be introduced into MongoDB.
How to fix
Update your software up to the latest version
27.11.2012 - Vendor gets vulnerability details
13.02.2013 - Vendor releases fixed version and details
10.07.2013 - Public disclosure
The vulnerability was detected by Mikhail Firstov, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research:
About Positive Technologies
Positive Technologies www.ptsecurity.com is among the key players in the IT security market in Russia.
The principal activities of the company include the development of integrated tools for information security monitoring (MaxPatrol); providing IT security consulting services and technical support; development of the Securitylab leading Russian information security portal.
Among the clients of Positive Technologies, there are more than 40 state enterprises, more than 50 banks and financial organizations, 20 telecommunication companies, more than 40 plant facilities, as well as IT, service and retail companies from Russia, the CIS countries, the Baltic States, China, Ecuador, Germany, Great Britain, Holland, Iran, Israel, Japan, Mexico, the Republic of South Africa, Thailand, Turkey, and the USA.
Positive Technologies is a team of highly skilled developers, advisers and experts with years of vast hands-on experience. The company specialists possess professional titles and certificates; they are the members of various international societies and are actively involved in the IT security field development.