It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16.
Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash.
References
Link | Resource |
---|---|
https://jira.mongodb.org/browse/SERVER-58203 | Issue Tracking Patch Vendor Advisory |
https://jira.mongodb.org/browse/SERVER-59299 | Issue Tracking Patch Vendor Advisory |
https://jira.mongodb.org/browse/SERVER-60218 | Issue Tracking Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220609-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Sep 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16. Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash. |
23 Feb 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16. Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash. |
Information
Published : 2022-04-12 15:15
Updated : 2024-09-16 20:15
NVD link : CVE-2021-32040
Mitre link : CVE-2021-32040
CVE.ORG link : CVE-2021-32040
JSON object : View
Products Affected
mongodb
- mongodb