CVE-2024-8013
CSFLE and Queryable Encryption self-lookup may fail to encrypt values in subpipelines
Severity Score
2.2
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
A bug in query analysis of certain complex self-referential $lookup subpipelines may result in literal values in expressions for encrypted fields to be sent to the server as plaintext instead of ciphertext. Should this occur, no documents would be returned or written. This issue affects mongocryptd binary (v5.0 versions prior to 5.0.29, v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) and mongo_crypt_v1.so shared libraries (v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) released alongside MongoDB Enterprise Server versions.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-08-20 CVE Reserved
- 2024-10-28 CVE Published
- 2024-10-28 CVE Updated
- 2024-10-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
MongoDB Inc Search vendor "MongoDB Inc" | Mongocryptd Search vendor "MongoDB Inc" for product "Mongocryptd" | >= 5.0.0 < 5.0.29 Search vendor "MongoDB Inc" for product "Mongocryptd" and version " >= 5.0.0 < 5.0.29" | en |
Affected
| ||||||
MongoDB Inc Search vendor "MongoDB Inc" | Mongocryptd Search vendor "MongoDB Inc" for product "Mongocryptd" | >= 6.0.0 < 6.0.17 Search vendor "MongoDB Inc" for product "Mongocryptd" and version " >= 6.0.0 < 6.0.17" | en |
Affected
| ||||||
MongoDB Inc Search vendor "MongoDB Inc" | Mongocryptd Search vendor "MongoDB Inc" for product "Mongocryptd" | >= 7.0 < 7.012 Search vendor "MongoDB Inc" for product "Mongocryptd" and version " >= 7.0 < 7.012" | en |
Affected
| ||||||
MongoDB Inc Search vendor "MongoDB Inc" | Mongocryptd Search vendor "MongoDB Inc" for product "Mongocryptd" | >= 7.3.0 < 7.3.4 Search vendor "MongoDB Inc" for product "Mongocryptd" and version " >= 7.3.0 < 7.3.4" | en |
Affected
| ||||||
MongoDB Inc Search vendor "MongoDB Inc" | Mongo Crypt V1.so Search vendor "MongoDB Inc" for product "Mongo Crypt V1.so" | >= 6.0.0 < 6.0.17 Search vendor "MongoDB Inc" for product "Mongo Crypt V1.so" and version " >= 6.0.0 < 6.0.17" | en |
Affected
| ||||||
MongoDB Inc Search vendor "MongoDB Inc" | Mongo Crypt V1.so Search vendor "MongoDB Inc" for product "Mongo Crypt V1.so" | >= 7.0.0 < 7.0.12 Search vendor "MongoDB Inc" for product "Mongo Crypt V1.so" and version " >= 7.0.0 < 7.0.12" | en |
Affected
| ||||||
MongoDB Inc Search vendor "MongoDB Inc" | Mongo Crypt V1.so Search vendor "MongoDB Inc" for product "Mongo Crypt V1.so" | >= 7.3.0 < 7.3.4 Search vendor "MongoDB Inc" for product "Mongo Crypt V1.so" and version " >= 7.3.0 < 7.3.4" | en |
Affected
|