// For flags

CVE-2020-7928

Improper neutralization of null byte leads to read overrun

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A user authorized to perform database queries may trigger a read overrun and access arbitrary memory by issuing specially crafted queries. This issue affects MongoDB Server v4.4 versions prior to 4.4.1; MongoDB Server v4.2 versions prior to 4.2.9; MongoDB Server v4.0 versions prior to 4.0.20 and MongoDB Server v3.6 versions prior to 3.6.20.

Un usuario autorizado para realizar consultas de la base de datos puede desencadenar un desbordamiento de lectura y acceder a la memoria arbitraria mediante la emisión de consultas especialmente diseñadas. Este problema afecta a: MongoDB Server de MongoDB Inc versiones v4.4 anteriores a 4.4.1; versiones v4.2 anteriores a 4.2.9; versiones v4.0 anteriores a 4.0.20; versiones v3.6 anteriores a 3.6.20

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-23 CVE Reserved
  • 2020-11-23 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-158: Improper Neutralization of Null Byte or NUL Character
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mongodb
Search vendor "Mongodb"
Mongodb
Search vendor "Mongodb" for product "Mongodb"
>= 3.6.0 < 3.6.20
Search vendor "Mongodb" for product "Mongodb" and version " >= 3.6.0 < 3.6.20"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb
Search vendor "Mongodb" for product "Mongodb"
>= 4.0.0 < 4.0.20
Search vendor "Mongodb" for product "Mongodb" and version " >= 4.0.0 < 4.0.20"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb
Search vendor "Mongodb" for product "Mongodb"
>= 4.2.0 < 4.2.9
Search vendor "Mongodb" for product "Mongodb" and version " >= 4.2.0 < 4.2.9"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb
Search vendor "Mongodb" for product "Mongodb"
>= 4.4.0 < 4.4.1
Search vendor "Mongodb" for product "Mongodb" and version " >= 4.4.0 < 4.4.1"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb
Search vendor "Mongodb" for product "Mongodb"
>= 4.5.0 < 4.5.1
Search vendor "Mongodb" for product "Mongodb" and version " >= 4.5.0 < 4.5.1"
-
Affected