CVE-2024-6376 (CVSS 9.8) in MongoDB Compass Exposes Systems to Code Injection Risks
A recent discovery has unveiled a critical security vulnerability in MongoDB Compass, a widely-used graphical user interface (GUI) for querying, aggregating, and analyzing MongoDB data. This tool, known for its robust capabilities and cross-platform support on macOS, Windows, and Linux, now faces a significant security challenge.
The vulnerability, identified as CVE-2024-6376, stems from insufficient sandbox protection settings within the ejson shell parser used in Compass’ connection handling. This flaw potentially allows malicious actors to execute arbitrary code on systems running affected versions of the software.
For users, the implications are severe. Systems running vulnerable versions of MongoDB Compass are susceptible to breaches that could lead to data loss, corruption, and unauthorized access. The widespread use of MongoDB in various industries amplifies the potential impact, making it a pressing concern for organizations relying on this technology.
MongoDB Compass versions prior to 1.42.2 are impacted by this vulnerability, placing numerous users at risk. The National Vulnerability Database (NVD) has assigned a CVSS score of 9.8 to this flaw, indicating its critical nature. In contrast, MongoDB, Inc. has assessed the vulnerability with a CVSS score of 7.0, highlighting the severity but suggesting slightly lower risk parameters.
MongoDB has promptly addressed the CVE-2024-6376 vulnerability by releasing Compass version 1.42.2. Users are strongly urged to update to this latest version immediately to protect themselves from potential attacks.