CVE-2023-3696 – Prototype Pollution in automattic/mongoose
https://notcve.org/view.php?id=CVE-2023-3696
Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.4. • https://github.com/automattic/mongoose/commit/305ce4ff789261df7e3f6e72363d0703e025f80d https://huntr.dev/bounties/1eef5a72-f6ab-4f61-b31d-fc66f5b4b467 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •
CVE-2023-34188
https://notcve.org/view.php?id=CVE-2023-34188
The HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers. By sending a single attack payload over TCP, an attacker can cause an infinite loop in which the server continuously reparses that payload, and does not respond to any other requests. • https://blog.narfindustries.com/blog/narf-discovers-critical-vulnerabilities-in-cesanta-mongoose-http-server https://github.com/cesanta/mongoose/commit/4663090a8fb036146dfe77718cff612b0101cb0f https://github.com/cesanta/mongoose/compare/7.9...7.10 https://github.com/cesanta/mongoose/pull/2197 •
CVE-2022-2564 – Prototype Pollution in automattic/mongoose
https://notcve.org/view.php?id=CVE-2022-2564
Prototype Pollution in GitHub repository automattic/mongoose prior to 6.4.6. Una Contaminación de Prototipo en el repositorio de GitHub automattic/mongoose versiones anteriores a 6.4.6 • https://github.com/Automattic/mongoose/blob/51e758541763b6f14569744ced15cc23ab8b50c6/lib/schema.js#L88-L141 https://github.com/Automattic/mongoose/compare/6.4.5...6.4.6 https://github.com/automattic/mongoose/commit/a45cfb6b0ce0067ae9794cfa80f7917e1fb3c6f8 https://huntr.dev/bounties/055be524-9296-4b2f-b68d-6d5b810d1ddd • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •
CVE-2022-25299 – Arbitrary File Write
https://notcve.org/view.php?id=CVE-2022-25299
This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder. Esto afecta al paquete cesanta/mongoose versiones anteriores a 7.6. Un manejo no seguro de los nombres de archivo durante la carga usando el método mg_http_upload() puede permitir a atacantes escribir archivos en ubicaciones arbitrarias fuera de la carpeta de destino designada • https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945 https://snyk.io/vuln/SNYK-UNMANAGED-CESANTAMONGOOSE-2404180 • CWE-552: Files or Directories Accessible to External Parties •
CVE-2019-17426
https://notcve.org/view.php?id=CVE-2019-17426
Automattic Mongoose through 5.7.4 allows attackers to bypass access control (in some applications) because any query object with a _bsontype attribute is ignored. For example, adding "_bsontype":"a" can sometimes interfere with a query filter. NOTE: this CVE is about Mongoose's failure to work around this _bsontype special case that exists in older versions of the bson parser (aka the mongodb/js-bson project). Automattic Mongoose versiones hasta 5.7.4, permite a atacantes omitir el control de acceso (en algunas aplicaciones) porque cualquier objeto de consulta con un atributo _bsontype es ignorado. Por ejemplo, agregar "_bsontype":"a" a veces puede interferir con un filtro de consulta. • https://github.com/Automattic/mongoose/commit/f3eca5b94d822225c04e96cbeed9f095afb3c31c https://github.com/Automattic/mongoose/issues/8222 •