Is that exploit applicable to a sharded cluster?
On 31 Бер, 06:04, Christian Csar <
cac...@gmail.com> wrote:
> Mark,
> I may be missing something, but is there a security bulletin of some
> kind? My main complaint is mostly that outside of these posts the sum total
> of information available from 10gen appears to be
>
> - "Unchecked access to SpiderMonkey’s JavaScript nativeHelper function.
> See SERVER-9124 <
https://jira.mongodb.org/browse/SERVER-9124>: fix
> available in 2.2.4, 2.4.2, and 2.0.9."
> - and in that bug "Add a level of indirection to nativeHelper's function
> upgrading to them? "is out and ready for testing"<
https://groups.google.com/forum/?fromgroups=#!topic/mongodb-announce/...>suggests not. Again an 'actionable step' would have been nice. It might be
> 'upgrade to 2.2.4 and 2.0.9 when they are released.' On a related note,
> should we expect notices on the alerts page to get posted to the announce
> list this message
> <
https://groups.google.com/forum/?fromgroups=#!topic/mongodb-announce/...>has
> useful information in it about that nonsecurity issue.
>
> Finally there's "This feature/vulnerability was reported 3 weeks ago to
> 10gen developers, no patch was commit but the default javascript engine was
> changed in last version so there is no more nativeHelper.apply function."
> <
http://blog.scrt.ch/2013/03/24/mongodb-0-day-ssji-to-rce/>I don't know
> anything about the communication that happened or agixid's track record,
> and I understand that communicating with security researchers can be
> difficult especially when they have different expectations. But if 2.4 came
> out apparently containing a fix for the issue reported and he'd already
> held off three weeks, a message asking him to hold off for a few more weeks
> until you had fixes for all supported versions ready might have worked and
> let this process be smoother.
>
> In short, I'm disappointed, but my own basic analysis is that this
> vulnerability is likely RCE but matters to one's application only if it
> either 1. uses a shared MongoDB instance or 2. has preexisting injection
> vulnerabilities (which now could potentially hurt the whole server vs just
> your data).
>
> Christian
>
>
>
>
>
>
>
> On Friday, March 29, 2013 10:58:35 AM UTC-7, Mark Hillick wrote:
>
> > Hi Bryan,
>
> > Thanks for your question and I truly appreciate your concern on this
> > issue. We take security issues like this very seriously and apologies if
> > you feel our advice was inadequate.
>
> > >> There are reports in the wild of RCE, and as far as I can tell no
> > fixed release.
>
> > I have previously communicated on this CVE a few times on this thread,
> > have my answers been unclear? Here is another thread on the same topic -
> >
https://groups.google.com/forum/?fromgroups=#!searchin/mongodb-user/c...
> > .
> > Additionally, as you will see from SERVER-9124<
https://jira.mongodb.org/browse/SERVER-9124>,
> > a fix has been committed to the 2.0, 2.2 and 2.4 code (2.0.9, 2.2.4 and
> > 2.4.2).
>
> > 2.2.4rc0 and 2.0.9rc0 have been released and this communication has bene
> > published on this Google Group. Again please let me know if this is unclear.
>
> > At present, I do not believe this is RCE - as I previously said I have
> > seen no evidence of successful code execution. The `mongod` service dies
> > when the query is executed and yes, this is most definitely not good
> > either.
>
> > From current analysis, the query can only be delivered through direct
> > connection to the mongod process, the POC is through a connection with the
> > `mongo` shell. Therefore, if you run with authentication, only an
> > authenticated user could run this query. If you have you `mongod` server
> > segregated off through firewall rules or other network acls then the query
> > can only be delivered from allowed devices.
>
> > >> There are reports in the wild of RCE
>
> > Can you provide evidence of this to
secu...@10gen.com <javascript:>please? I have not seen a true RCE, the `mongod` process always dies - no
> >>>
http://docs.mongodb.org/manual/administration/security/#vulnerability....
> >>> The good news is the fix has been committed (to 2.0, 2.2 and 2.4) as per my
> >>> previous update.
>
> >>> If anything is unclear or you feel I'm mistaken, please let me know.
>
> >>> Thanks
>
> >>> Mark
>
> >>> On Wednesday, March 27, 2013 8:09:06 PM UTC, Christian Csar wrote:
>
> >>>> I may just be reading that blog post incorrectly, but are you sure that
> >>>> isn't RCE? If Eve has access to a MongoDB database on a different server,
> >>>> ie she is using a shared mongodb hosting service, then she can legitimately
> >>>> submit queries to the server. The example exploit uses
> >>>> "db.my_collection.find(" to submit the exploit code. Is there a reason Eve
> >>>> can't make use of this remotely to execute code in the Mongo process she
> >>>> wouldn't otherwise have privileges to execute? CVE-2013-1892 is new enough
> >>>> that it doesn't seem to be on the NIST tracker.
>
> >>>> Christian
>
> >>>> On Wednesday, March 27, 2013 10:27:15 AM UTC-7, Mark Hillick wrote:
>
> >>>>> Hi Santiago,
>
> >>>>> The blog post by the
>
> ...
>
> читати далі »