Vulnerability Details : CVE-2021-21422
Potential exploit
mongo-express is a web-based MongoDB admin interface, written with Node.js and express. 1: As mentioned in this issue: https://github.com/mongo-express/mongo-express/issues/577, when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. 2: Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc. As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use a payload with embedded javascript. This could send an export of a collection to the attacker without even an admin knowing. Other types of attacks such as dropping a database\collection are possible.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2021-21422
- cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:mongo-express_project:mongo-express:1.0.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:mongo-express_project:mongo-express:1.0.0:alpha3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-21422
1.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-21422
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
GitHub, Inc. |
CWE ids for CVE-2021-21422
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: security-advisories@github.com (Primary)
References for CVE-2021-21422
-
https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p
Multiple XSS Vulnerabilities · Advisory · mongo-express/mongo-express · GitHubExploit;Third Party Advisory
-
https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b
Merge pull request from GHSA-7p8h-86p5-wv3p · mongo-express/mongo-express@f5e0d49 · GitHubPatch;Third Party Advisory
-
https://github.com/mongo-express/mongo-express/issues/577
HTML in String fields is not escaped if only preview is loaded · Issue #577 · mongo-express/mongo-express · GitHubExploit;Third Party Advisory
Jump to