Vulnerability Name: | CVE-2016-6494 (CCN-117469) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-10-03 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2016-10-03 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-11-28 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-6494 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20160729 CVE request: mongodb: world-readable .dbshell history file Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20160729 Re: CVE request: mongodb: world-readable .dbshell history file Source: BID Type: Third Party Advisory, VDB Entry 92204 Source: CCN Type: BID-92204 mongodb-clients CVE-2016-6494 Local Information Disclosure Vulnerability Source: CONFIRM Type: Issue Tracking https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832908 Source: CCN Type: Red Hat Bugzilla Bug 1362553 (CVE-2016-6494) CVE-2016-6494 mongodb: world-readable .dbshell history file Source: CONFIRM Type: Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1362553 Source: XF Type: UNKNOWN mongodb-cve20166494-info-disc(117469) Source: CONFIRM Type: Issue Tracking, Patch https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0 Source: CONFIRM Type: Issue Tracking https://jira.mongodb.org/browse/SERVER-25335 Source: FEDORA Type: Third Party Advisory FEDORA-2016-9a8e2bbc04 Source: CCN Type: IBM Security Bulletin 1993793 (Monitoring) a vulnerability in MongoDB affects IBM Performance Management products (CVE-2016-6494) Source: CCN Type: MongoDB Web Site MongoDB for GIANT Ideas | MongoDB Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-6494 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |