The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability alert CVE-2017-15535

MongoDB: read-write access via Wire Protocol Compression

Synthesis of the vulnerability

An attacker can bypass access restrictions via Wire Protocol Compression of MongoDB, in order to read or alter data.
Impacted systems: Fedora, MongoDB Server, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity of this alert: 2/4.
Consequences of an intrusion: data reading, data creation/edition, data deletion.
Pirate's origin: intranet client.
Creation date: 02/11/2017.
Références of this alert: CERTFR-2017-AVI-386, CVE-2017-15535, FEDORA-2017-774e7863a4, FEDORA-2017-913288e9a9, openSUSE-SU-2017:3018-1, openSUSE-SU-2017:3022-1, VIGILANCE-VUL-24311.

Description of the vulnerability

An attacker can bypass access restrictions via Wire Protocol Compression of MongoDB, in order to read or alter data.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides networks vulnerabilities alerts. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.