# N/A
## 漏洞概述
Mongoose在8.9.5之前的版本中,不恰当地使用嵌套的$where过滤器与populate()匹配,导致搜索注入。
## 影响版本
- Mongoose < 8.9.5
## 漏洞细节
由于对CVE-2024-53900的修复不完整,导致Mongoose在使用嵌套的$where过滤器与populate()匹配时,可能出现搜索注入的问题。
## 漏洞影响
此漏洞可导致搜索注入,可能使攻击者通过精心构造的查询来访问或操作不应被其访问的数据。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | NoSQL injection vulnerability in Mongoose < 8.9.5 affecting the populate() function's match option. This vulnerability exists due to an incomplete fix for CVE-2024-53900. While direct $where injection is blocked, attackers can bypass this protection by nesting $where operators within logical operators like $and, allowing execution of arbitrary JavaScript code on MongoDB server, bypassing authentication, and accessing sensitive administrative data. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-23061.yaml | POC详情 |
标题: mongoose - npm -- 🔗来源链接
标签:
标题: Release 8.9.5 · Automattic/mongoose · GitHub -- 🔗来源链接
标签:
标题: fix: disallow nested $where in populate match · Automattic/mongoose@64a9f97 · GitHub -- 🔗来源链接
标签:
暂无评论