Improper serialization of internal state in the authorization subsystem in MongoDB Server's authorization subsystem permits a user with valid credentials to bypass IP whitelisting protection mechanisms following administrative action. This issue affects MongoDB Server v4.2 versions prior to 4.2.3; MongoDB Server v4.0 versions prior to 4.0.15; MongoDB Server v4.3 versions prior to 4.3.3and MongoDB Server v3.6 versions prior to 3.6.18.
References
Link | Resource |
---|---|
https://jira.mongodb.org/browse/SERVER-45472 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 Jan 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Improper serialization of internal state in the authorization subsystem in MongoDB Server's authorization subsystem permits a user with valid credentials to bypass IP whitelisting protection mechanisms following administrative action. This issue affects MongoDB Server v4.2 versions prior to 4.2.3; MongoDB Server v4.0 versions prior to 4.0.15; MongoDB Server v4.3 versions prior to 4.3.3and MongoDB Server v3.6 versions prior to 3.6.18. |
19 Jun 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Improper serialization of internal state in the authorization subsystem in MongoDB Server's authorization subsystem permits a user with valid credentials to bypass IP whitelisting protection mechanisms following administrative action. This issue affects: MongoDB Inc. MongoDB Server 4.2 versions prior to 4.2.3; 4.0 versions prior to 4.0.15; 4.3 versions prior to 4.3.3; 3.6 versions prior to 3.6.18. |
Information
Published : 2020-05-06 15:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-7921
Mitre link : CVE-2020-7921
CVE.ORG link : CVE-2020-7921
JSON object : View
Products Affected
mongodb
- mongodb