6
CVSSv2

CVE-2019-2386

Published: 06/08/2019 Updated: 23/01/2024
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 7.1 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones. This issue affects MongoDB Server v4.0 versions before 4.0.9; MongoDB Server v3.6 versions before 3.6.13 and MongoDB Server v3.4 versions before 3.4.22. Workaround: After deleting one or more users, restart any nodes which may have had active user authorization sessions. Refrain from creating user accounts with the same name as previously deleted accounts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mongodb mongodb

Vendor Advisories

Debian Bug report logs - #934783 mongodb: CVE-2019-2386 Package: src:mongodb; Maintainer for src:mongodb is Debian MongoDB Maintainers <team+mongodb@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 14 Aug 2019 20:03:02 UTC Severity: grave Tags: security, upstream Found in version ...
Impact: Moderate Public Date: 2019-08-06 CWE: CWE-613 Bugzilla: 1746132: CVE-2019-2386 mongodb: Imprope ...