Vulnerability Details CVE-2021-32040
It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16.
Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 66.9%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 5.0
Products affected by CVE-2021-32040
-
cpe:2.3:a:mongodb:mongodb:4.2.0
-
cpe:2.3:a:mongodb:mongodb:4.2.1
-
cpe:2.3:a:mongodb:mongodb:4.2.10
-
cpe:2.3:a:mongodb:mongodb:4.2.11
-
cpe:2.3:a:mongodb:mongodb:4.2.12
-
cpe:2.3:a:mongodb:mongodb:4.2.13
-
cpe:2.3:a:mongodb:mongodb:4.2.14
-
cpe:2.3:a:mongodb:mongodb:4.2.15
-
cpe:2.3:a:mongodb:mongodb:4.2.2
-
cpe:2.3:a:mongodb:mongodb:4.2.3
-
cpe:2.3:a:mongodb:mongodb:4.2.4
-
cpe:2.3:a:mongodb:mongodb:4.2.5
-
cpe:2.3:a:mongodb:mongodb:4.2.6
-
cpe:2.3:a:mongodb:mongodb:4.2.7
-
cpe:2.3:a:mongodb:mongodb:4.2.8
-
cpe:2.3:a:mongodb:mongodb:4.2.9
-
cpe:2.3:a:mongodb:mongodb:4.4.0
-
cpe:2.3:a:mongodb:mongodb:4.4.1
-
cpe:2.3:a:mongodb:mongodb:4.4.10
-
cpe:2.3:a:mongodb:mongodb:4.4.2
-
cpe:2.3:a:mongodb:mongodb:4.4.3
-
cpe:2.3:a:mongodb:mongodb:4.4.4
-
cpe:2.3:a:mongodb:mongodb:4.4.5
-
cpe:2.3:a:mongodb:mongodb:4.4.6
-
cpe:2.3:a:mongodb:mongodb:4.4.7
-
cpe:2.3:a:mongodb:mongodb:4.4.8
-
cpe:2.3:a:mongodb:mongodb:4.4.9
-
cpe:2.3:a:mongodb:mongodb:5.0.0
-
cpe:2.3:a:mongodb:mongodb:5.0.1
-
cpe:2.3:a:mongodb:mongodb:5.0.2
-
cpe:2.3:a:mongodb:mongodb:5.0.3