Miggo Logo

CVE-2025-1693: MongoDB Shell may be susceptible to control character Injection via shell output

3.9

CVSS Score
3.1

Basic Information

EPSS Score
0.19674%
Published
2/27/2025
Updated
2/27/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
mongoshnpm< 2.3.92.3.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper neutralization of control sequences in shell output. Based on mongosh's architecture:

  1. Output formatting functions like formatOutput would handle data presentation
  2. Console methods like log would be primary output vectors
  3. These locations likely process untrusted database content without adequate sanitization
  4. Confidence is medium due to lack of direct patch evidence, but matches CWE-150 patterns in CLI tools

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** Mon*o** S**ll m*y ** sus**pti*l* to *ontrol ***r**t*r inj**tion w**r* *n *tt**k*r wit* *ontrol ov*r t** **t***s* *lust*r *ont*nts **n inj**t *ontrol ***r**t*rs into t** s**ll output. T*is m*y r*sult in t** *ispl*y o* **lsi*i** m*ss***s t**t *pp**

Reasoning

T** vuln*r**ility st*ms *rom improp*r n*utr*liz*tion o* *ontrol s*qu*n**s in s**ll output. **s** on mon*os*'s *r**it**tur*: *. Output *orm*ttin* *un*tions lik* *orm*tOutput woul* **n*l* **t* pr*s*nt*tion *. *onsol* m*t*o*s lik* lo* woul* ** prim*ry