Bug 1901079 (CVE-2020-7927)

Summary: CVE-2020-7927 mongodb: Privilege escalation via crafted API calls
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: admiller, athomas, bkearney, clalancette, databases-maint, dbecker, gghezzo, gparvin, hhorak, jjoyce, jorton, jpacner, jramanat, jschluet, jweiser, lhh, lpeer, mburns, mskalicky, panovotn, sclewis, slinaber, stcannon, strobert, tdawson, thee
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mongodb 4.4.3 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-12-01 17:34:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1901080    
Bug Blocks: 1900872    

Description Pedro Sampaio 2020-11-24 13:00:08 UTC
Specially crafted API calls may allow an authenticated user who holds Organization Owner privilege to obtain an API key with Global Role privilege. This issue affects MongoDB Ops Manager v4.2 versions 4.2.0-4.2.17, v4.3 versions 4.3.0-4.3.9 and v4.4 versions 4.4.0-4.4.2.

References:

https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-4-3

Comment 1 Pedro Sampaio 2020-11-24 13:00:51 UTC
Created mongodb tracking bugs for this issue:

Affects: epel-all [bug 1901080]

Comment 2 Yadnyawalk Tale 2020-11-30 17:39:44 UTC
Red Hat Satellite 6.6 onward does not ship the MongoDB package; however, the product consumes MongoDB from Red Hat Software Collections (RHSCL) for Red Hat Enterprise Linux. Satellite has no plans to update to a version of MongoDB released with a Server Side Public License (SSPL) which includes all versions released after October 16, 2018. Refer to this article for more information: https://access.redhat.com/articles/5767021

Comment 3 Product Security DevOps Team 2020-12-01 17:34:06 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-7927