The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1362553 | issue tracking |
http://www.openwall.com/lists/oss-security/2016/07/29/8 | third party advisory mailing list |
https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0 | issue tracking patch |
http://www.securityfocus.com/bid/92204 | vdb entry third party advisory |
https://jira.mongodb.org/browse/SERVER-25335 | issue tracking |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MCE2ZLFBNOK3TTWSTXZJQGZVP4EEJDL/ | vendor advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832908 | issue tracking |
http://www.openwall.com/lists/oss-security/2016/07/29/4 | third party advisory mailing list |