// For flags

CVE-2021-21422

XSS Vulnerability in mongo-express

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

mongo-express is a web-based MongoDB admin interface, written with Node.js and express. 1: As mentioned in this issue: https://github.com/mongo-express/mongo-express/issues/577, when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. 2: Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc. As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use a payload with embedded javascript. This could send an export of a collection to the attacker without even an admin knowing. Other types of attacks such as dropping a database\collection are possible.

mongo-express es una interfaz de administración de MongoDB basada en la web, escrita con Node.js y express. 1: Como se menciona en este tema: https://github.com/mongo-express/mongo-express/issues/577, cuando el contenido de una celda crece más que el tamaño soportado, al hacer clic en una fila se mostrará el documento completo sin escapar, sin embargo esto necesita la interacción del administrador en la celda. 2: Las celdas de datos identificadas como medios de comunicación se renderizarán como medios de comunicación, sin ser saneados. Ejemplo de diferentes renderizados: imagen, audio, video, etc. Como ejemplo de ataque de tipo 1, un usuario no autorizado que sólo puede enviar una gran cantidad de datos en un campo de un documento puede utilizar una carga útil con javascript insertado. Esto podría enviar una exportación de una colección al atacante sin que ni siquiera un administrador lo sepa. Otros tipos de ataques, como la caída de base de datos\colección , son posibles

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-22 CVE Reserved
  • 2021-06-21 CVE Published
  • 2024-03-06 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mongo-express Project
Search vendor "Mongo-express Project"
Mongo-express
Search vendor "Mongo-express Project" for product "Mongo-express"
<= 0.54.0
Search vendor "Mongo-express Project" for product "Mongo-express" and version " <= 0.54.0"
node.js
Affected
Mongo-express Project
Search vendor "Mongo-express Project"
Mongo-express
Search vendor "Mongo-express Project" for product "Mongo-express"
1.0.0
Search vendor "Mongo-express Project" for product "Mongo-express" and version "1.0.0"
alpha1
Affected
Mongo-express Project
Search vendor "Mongo-express Project"
Mongo-express
Search vendor "Mongo-express Project" for product "Mongo-express"
1.0.0
Search vendor "Mongo-express Project" for product "Mongo-express" and version "1.0.0"
alpha3
Affected