It was found that MongoDB creates a world-readable .dbshell history file in a user's directory: The mongodb client doesn't store authentication commands, but there's still information leakage, though, even if only about database and collection names, or data structure. As for data itself, the history could also contain sensitive information; for instance, if usernames for some other service were stored in a mongo collection, the history could contain lines like: db.users.find({user:"foo"}) or even: db.users.update({user:"foo"},{$set:{password:"OhComeOnNow"}}) Upstream bug (closed as "Works as Designed"): https://jira.mongodb.org/browse/SERVER-25335 CVE request: http://seclists.org/oss-sec/2016/q3/199
Created mongodb tracking bugs for this issue: Affects: fedora-all [bug 1362554] Affects: epel-all [bug 1362555]
So should be Fedora and EPEL bugs fixed if this bug is closed as WONTFIX?
(In reply to Marek Skalický from comment #2) > So should be Fedora and EPEL bugs fixed if this bug is closed as WONTFIX? I'll leave that decision to the Fedora/EPEL maintaner but seeing as this was closed upstream, and home directories in RHEL and Fedora are not world readable to other users, I don't see this as something worth developing an out-of-band patch for.
FWIW, this seems to be fixed upstream in the end, in link from comment #0.
Fedora/EPEL bugs are already fixed/in testing.