Bug 1901079 (CVE-2020-7927) - CVE-2020-7927 mongodb: Privilege escalation via crafted API calls
Summary: CVE-2020-7927 mongodb: Privilege escalation via crafted API calls
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2020-7927
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1901080
Blocks: 1900872
TreeView+ depends on / blocked
 
Reported: 2020-11-24 13:00 UTC by Pedro Sampaio
Modified: 2021-02-13 00:09 UTC (History)
26 users (show)

Fixed In Version: mongodb 4.4.3
Clone Of:
Environment:
Last Closed: 2020-12-01 17:34:06 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2020-11-24 13:00:08 UTC
Specially crafted API calls may allow an authenticated user who holds Organization Owner privilege to obtain an API key with Global Role privilege. This issue affects MongoDB Ops Manager v4.2 versions 4.2.0-4.2.17, v4.3 versions 4.3.0-4.3.9 and v4.4 versions 4.4.0-4.4.2.

References:

https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-4-3

Comment 1 Pedro Sampaio 2020-11-24 13:00:51 UTC
Created mongodb tracking bugs for this issue:

Affects: epel-all [bug 1901080]

Comment 2 Yadnyawalk Tale 2020-11-30 17:39:44 UTC
Red Hat Satellite 6.6 onward does not ship the MongoDB package; however, the product consumes MongoDB from Red Hat Software Collections (RHSCL) for Red Hat Enterprise Linux. Satellite has no plans to update to a version of MongoDB released with a Server Side Public License (SSPL) which includes all versions released after October 16, 2018. Refer to this article for more information: https://access.redhat.com/articles/5767021

Comment 3 Product Security DevOps Team 2020-12-01 17:34:06 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-7927


Note You need to log in before you can comment on or make changes to this bug.