// For flags

CVE-2019-2386

Authorization session conflation

Severity Score

7.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones. This issue affects MongoDB Server v4.0 versions prior to 4.0.9; MongoDB Server v3.6 versions prior to 3.6.13 and MongoDB Server v3.4 versions prior to 3.4.22.

Workaround:
After deleting one or more users, restart any nodes which may have had active user authorization sessions.

Refrain from creating user accounts with the same name as previously deleted accounts.

Después de la eliminación del usuario en MongoDB Server, la incomprobación incorrecta de las sesiones de autorización permite que la sesión de usuario autenticada persista y venga combinada con cuentas nuevas, si esas cuentas reutilizan los nombres de las eliminadas. Este problema afecta a: MongoDB Inc. MongoDB Server versiones v4.0 anteriores a 4.0.9; versiones v3.6 anteriores a 3.6.13; versiones v3.4 anteriores a 3.4.22.

*Credits: Discovered by Mitch Wasson of Cisco's Advanced Malware Protection Group.
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-10 CVE Reserved
  • 2019-08-06 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-285: Improper Authorization
  • CWE-613: Insufficient Session Expiration
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mongodb
Search vendor "Mongodb"
Mongodb
Search vendor "Mongodb" for product "Mongodb"
>= 3.4.0 < 3.4.22
Search vendor "Mongodb" for product "Mongodb" and version " >= 3.4.0 < 3.4.22"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb
Search vendor "Mongodb" for product "Mongodb"
>= 3.6.0 < 3.6.13
Search vendor "Mongodb" for product "Mongodb" and version " >= 3.6.0 < 3.6.13"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb
Search vendor "Mongodb" for product "Mongodb"
>= 4.0.0 < 4.0.9
Search vendor "Mongodb" for product "Mongodb" and version " >= 4.0.0 < 4.0.9"
-
Affected