vulnerability
MongoDB: Information Exposure (CVE-2016-6494)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Oct 3, 2016 | Oct 31, 2019 | Nov 27, 2024 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Oct 3, 2016
Added
Oct 31, 2019
Modified
Nov 27, 2024
Description
The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.
Solutions
mongodb-upgrade-3_0_15mongodb-upgrade-3_2_14mongodb-upgrade-3_3_14
References
- CVE-2016-6494
- https://attackerkb.com/topics/CVE-2016-6494
- URL-http://www.openwall.com/lists/oss-security/2016/07/29/4
- URL-http://www.openwall.com/lists/oss-security/2016/07/29/8
- URL-http://www.securityfocus.com/bid/92204
- URL-https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832908
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1362553
- URL-https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0
- URL-https://jira.mongodb.org/browse/SERVER-25335
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MCE2ZLFBNOK3TTWSTXZJQGZVP4EEJDL/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.