Vulnerability Name:

CVE-2015-4411 (CCN-103887)

Assigned:2015-06-05
Published:2015-06-05
Updated:2020-02-28
Summary:The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string.
Note: This issue is due to an incomplete fix to CVE-2015-4410.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-400
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2015-4411

Source: MISC
Type: Mailing List, Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html

Source: MISC
Type: Mailing List, Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html

Source: MISC
Type: Mailing List, Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/06/06/3

Source: MISC
Type: Third Party Advisory, VDB Entry
http://www.securityfocus.com/bid/75045

Source: CCN
Type: Red Hat Bugzilla – Bug 1229706
(CVE-2015-4411) CVE-2015-4411 rubygem-moped: Denial of Service with crafted ObjectId string (incomplete fix for CVE-2015-4410)

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1229706

Source: XF
Type: UNKNOWN
rubygem-moped-cve20154411-dos(103887)

Source: CCN
Type: RubyGems GIT Repository
Use \A \z for checking regex on legal

Source: MISC
Type: Patch
https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999

Source: MISC
Type: Patch
https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191

Source: MISC
Type: Patch
https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7

Source: MISC
Type: Patch
https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24

Source: MISC
Type: Exploit, Third Party Advisory
https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html

Source: CCN
Type: RubyGems Web site
moped

Source: MISC
Type: Exploit, Third Party Advisory
https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html

Source: MISC
Type: Mailing List, Third Party Advisory
https://seclists.org/oss-sec/2015/q2/653

Source: MISC
Type: Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2015-4411

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.securityfocus.com/bid/75045

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-4411

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mongodb:bson:*:*:*:*:*:ruby:*:* (Version < 3.0.4)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:21:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:22:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.xenial:def:201544110000000
    V
    CVE-2015-4411 on Ubuntu 16.04 LTS (xenial) - medium.
    2015-06-10
    oval:com.ubuntu.artful:def:20154411000
    V
    CVE-2015-4411 on Ubuntu 17.10 (artful) - medium.
    2015-06-10
    oval:com.ubuntu.xenial:def:20154411000
    V
    CVE-2015-4411 on Ubuntu 16.04 LTS (xenial) - medium.
    2015-06-10
    oval:com.ubuntu.bionic:def:20154411000
    V
    CVE-2015-4411 on Ubuntu 18.04 LTS (bionic) - medium.
    2015-06-10
    oval:com.ubuntu.cosmic:def:201544110000000
    V
    CVE-2015-4411 on Ubuntu 18.10 (cosmic) - medium.
    2015-06-10
    oval:com.ubuntu.cosmic:def:20154411000
    V
    CVE-2015-4411 on Ubuntu 18.10 (cosmic) - medium.
    2015-06-10
    oval:com.ubuntu.bionic:def:201544110000000
    V
    CVE-2015-4411 on Ubuntu 18.04 LTS (bionic) - medium.
    2015-06-10
    oval:com.ubuntu.trusty:def:20154411000
    V
    CVE-2015-4411 on Ubuntu 14.04 LTS (trusty) - medium.
    2015-06-10
    BACK
    mongodb bson *
    fedoraproject fedora 21
    fedoraproject fedora 22