.. / CVE-2020-24391

Exploit for Mongo-Express - Remote Code Execution (CVE-2020-24391)

Description:

Mongo-Express before 1.0.0 is susceptible to remote code execution because it uses safer-eval to validate user supplied javascript. Unfortunately safer-eval sandboxing capabilities are easily bypassed leading to remote code execution in the context of the node server.

Nuclei Template

View the template here CVE-2020-24391.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-24391.yaml
Copy

References:

https://securitylab.github.com/advisories/GHSL-2020-131-mongo-express/
https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a
https://nvd.nist.gov/vuln/detail/CVE-2020-24391
https://github.com/ARPSyndicate/kenzer-templates
https://github.com/mongodb-js/query-parser/issues/16