Service Notices

All Notices > Security Notices > Mongo-Express Remote Code Execution Vulnerability (CVE-2019-10758)

Mongo-Express Remote Code Execution Vulnerability (CVE-2019-10758)

Jan 10, 2020 GMT+08:00

I. Overview

It is officially disclosed that Mongo-Express before 0.54.0 is vulnerable to the RCE vulnerability (CVE-2019-10758). Mongo-Express is a web-based and lightweight MongoDB admin interface. With an affected version, any authenticated user can perform remote code execution. Attackers can exploit this vulnerability and the default account and password of Mongo-Express to construct malicious requests and initiate attacks, exposing the system to high risks.

Therefore, we kindly remind Mongo-Express users to arrange self-check and implement timely security hardening.

Reference links:

https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq

https://github.com/masahiro331/CVE-2019-10758/

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Product

Affected Versions:

Mongo-Express versions earlier than 0.54.0

Secure Versions:

Mongo-Express 0.54.0 and later versions

IV. Vulnerability Handling

This vulnerability has been fixed in Mongo-Express 0.54.0. You are advised to upgrade mongo-express to 0.54.0 or a later secure version and set a strong password to prevent security risks caused by unauthorized or weak password access.

Mongo-Express GitHub address: https://github.com/mongo-express/mongo-express

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.