漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
Deserializing compromised object with MongoDB .NET/C# Driver may cause remote code execution
漏洞信息
Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0 Following configuration must be true for the vulnerability to be applicable: * Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND * Application must be running on a Windows host using the full .NET Framework, not .NET Core AND * Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND * Malicious attacker must have unrestricted insert access to target database to add a _t discriminator."Following configuration must be true for the vulnerability to be applicable
漏洞信息
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
漏洞
可信数据的反序列化
漏洞
MongoDB 代码问题漏洞
漏洞信息
MongoDB是美国MongoDB公司的一种面向文档的数据库管理系统。 MongoDB .NET/C# Driver v2.18.0版本及之前版本存在代码问题漏洞。攻击者利用该漏洞可以执行任意代码。
漏洞信息
N/A
漏洞
N/A