From 3a334d494968a520408ea29a1b1602fa7527fb7d Mon Sep 17 00:00:00 2001 From: Boris Sieklik Date: Mon, 2 Aug 2021 13:45:14 +0100 Subject: [PATCH] Added CVE-2021-20332 --- 2021/20xxx/CVE-2021-20332.json | 91 +++++++++++++++++++++++++++++++--- 1 file changed, 85 insertions(+), 6 deletions(-) diff --git a/2021/20xxx/CVE-2021-20332.json b/2021/20xxx/CVE-2021-20332.json index 99a3a084235..3f4755d26f4 100644 --- a/2021/20xxx/CVE-2021-20332.json +++ b/2021/20xxx/CVE-2021-20332.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cna@mongodb.com", + "DATE_PUBLIC": "2021-08-02T15:30:00.000Z", "ID": "CVE-2021-20332", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "MongoDB Rust Driver may publish events containing authentication-related data to a connection pool event listener configured by an application" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MongoDB Rust Driver", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.0.0", + "version_value": "1.2.1" + }, + { + "version_affected": "=", + "version_name": "2.0.0", + "version_value": "2.0.0-alpha" + }, + { + "version_affected": "=", + "version_name": "2.0.0", + "version_value": "2.0.0-alpha1" + } + ] + } + } + ] + }, + "vendor_name": "MongoDB Inc." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Specific MongoDB Rust Driver versions can include credentials used by the connection pool to authenticate connections in the monitoring event that is emitted when the pool is created. The user's logging infrastructure could then potentially ingest these events and unexpectedly leak the credentials. Note that such monitoring is not enabled by default." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor " + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://jira.mongodb.org/browse/RUST-591" + } + ] + }, + "source": { + "discovery": "INTERNAL" } } \ No newline at end of file