Miggo Logo

CVE-2021-32050: MongoDB Driver may publish events containing authentication-related data

4.2

CVSS Score
3.1

Basic Information

EPSS Score
0.17755%
Published
8/29/2023
Updated
2/13/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
mongodb/mongodbcomposer>= 1.0.0, < 1.9.21.9.2
mongodbnpm>= 3.6.0, < 3.6.103.6.10
mongodbnpm>= 4.0.0, < 4.17.04.17.0
mongodbnpm>= 5.0.0, < 5.8.05.8.0
github.com/mongodb/mongo-swift-driverswift>= 1.0.0, < 1.1.11.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient redaction in command monitoring event handlers. Key evidence includes:

  1. Node.js driver's commit 8c8b4c3 shows changes to maybeRedact to handle HELLO_COMMANDS with speculative auth
  2. PHP driver's update to libmongoc 1.17.7 (C driver) in commit 4495de8
  3. Jira tickets (CDRIVER-3797, NODE-3356) explicitly mention command monitoring redaction fixes
  4. The vulnerability manifests in event publishing logic across drivers that share common C driver foundations

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Som* Mon*o** *riv*rs m*y *rron*ously pu*lis* *v*nts *ont*inin* *ut**nti**tion-r*l*t** **t* to * *omm*n* list*n*r *on*i*ur** *y *n *ppli**tion. T** pu*lis*** *v*nts m*y *ont*in s**urity-s*nsitiv* **t* w**n sp**i*i* *ut**nti**tion-r*l*t** *omm*n*s *r*

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt r****tion in *omm*n* monitorin* *v*nt **n*l*rs. K*y *vi**n** in*lu**s: *. No**.js *riv*r's *ommit ******* s*ows ***n**s to m*y**R****t to **n*l* **LLO_*OMM*N*S wit* sp**ul*tiv* *ut* *. P*P *riv*r's up**t* to