CVE-2024-7553
Publication date 7 August 2024
Last updated 25 June 2025
Ubuntu priority
Cvss 3 Severity Score
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1. Required Configuration: Only environments with Windows as the underlying operating system is affected by this issue
Status
Package | Ubuntu Release | Status |
---|---|---|
mongo-c-driver | 25.04 plucky | Ignored only affects Windows |
24.10 oracular | Ignored only affects Windows | |
24.04 LTS noble | Ignored only affects Windows | |
22.04 LTS jammy | Ignored only affects Windows | |
20.04 LTS focal | Ignored only affects Windows | |
mongodb | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Ignored only affects Windows | |
18.04 LTS bionic | Ignored only affects Windows | |
16.04 LTS xenial | Ignored only affects Windows | |
14.04 LTS trusty | Ignored only affects Windows | |
php-mongodb | 25.04 plucky | Ignored only affects Windows |
24.10 oracular | Ignored only affects Windows | |
24.04 LTS noble | Ignored only affects Windows | |
22.04 LTS jammy | Ignored only affects Windows | |
20.04 LTS focal | Ignored only affects Windows | |
18.04 LTS bionic | Ignored only affects Windows | |
16.04 LTS xenial | Ignored only affects Windows |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |