CVE-2023-4009 Vulnerability Details

  /     /     /  

CVE-2023-4009 Metadata Quick Info

CVE Published: 08/08/2023 | CVE Updated: 10/10/2024 | CVE Year: 2023
Source: mongodb | Vendor: MongoDB Inc. | Product: MongoDB Ops Manager
Status : PUBLISHED

CVE-2023-4009 Description

In MongoDB Ops Manager v5.0 prior to 5.0.22 and v6.0 prior to 6.0.17 it is possible for an authenticated user with project owner or project user admin access to generate an API key with the privileges of org owner resulting in privilege escalation.

Metrics

CVSS Version: 3.1 | Base Score: 7.2 HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* HIGH
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-648
CWE Name: CWE-648: Incorrect Use of Privileged APIs
Source: MongoDB Inc.

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).