{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-48282","assignerOrgId":"a39b4221-9bd0-4244-95fc-f3e2e07f1deb","state":"PUBLISHED","assignerShortName":"mongodb","dateReserved":"2023-01-23T15:11:45.562Z","datePublished":"2023-02-21T18:35:11.643Z","dateUpdated":"2025-03-11T19:20:08.556Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"MongoDB .NET/C# Driver","vendor":"MongoDB Inc","versions":[{"lessThanOrEqual":"v2.18.0","status":"affected","version":"0","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(238, 238, 238);\">Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND</span><br><span style=\"background-color: rgb(238, 238, 238);\">Application must be running on a Windows host using the full .NET Framework, not .NET Core AND</span><br><span style=\"background-color: rgb(238, 238, 238);\">Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND</span><br><span style=\"background-color: rgb(238, 238, 238);\">Malicious attacker must have unrestricted insert access to target database to add a _t discriminator.</span><br>"}],"value":"Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND\nApplication must be running on a Windows host using the full .NET Framework, not .NET Core AND\nApplication must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND\nMalicious attacker must have unrestricted insert access to target database to add a _t discriminator.\n"}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Jonathan Birch of Microsoft Office Security"}],"datePublic":"2023-02-21T19:39:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(238, 238, 238);\"><span style=\"background-color: rgb(238, 238, 238);\"><span style=\"background-color: rgb(238, 238, 238);\"><span style=\"background-color: rgb(238, 238, 238);\">Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0<br><br></span></span>Following configuration must be true for the vulnerability to be applicable:<ul><li><span style=\"background-color: rgb(238, 238, 238);\">Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND</span></li><li><span style=\"background-color: rgb(238, 238, 238);\">Application must be running on a Windows host using the full .NET Framework, not .NET Core AND</span></li><li><span style=\"background-color: rgb(238, 238, 238);\">Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND</span></li><li><span style=\"background-color: rgb(238, 238, 238);\">Malicious attacker must have unrestricted insert access to target database to add a _t discriminator.</span>\"Following configuration must be true for the vulnerability to be applicable</li></ul></span></span><br>"}],"value":"Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0\n\nFollowing configuration must be true for the vulnerability to be applicable:  *  Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND\n  *  Application must be running on a Windows host using the full .NET Framework, not .NET Core AND\n  *  Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND\n  *  Malicious attacker must have unrestricted insert access to target database to add a _t discriminator.\"Following configuration must be true for the vulnerability to be applicable\n\n\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.6,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-502","description":"CWE-502 Deserialization of Untrusted Data","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a39b4221-9bd0-4244-95fc-f3e2e07f1deb","shortName":"mongodb","dateUpdated":"2023-06-21T12:05:55.251Z"},"references":[{"url":"https://jira.mongodb.org/browse/CSHARP-4475"},{"url":"https://github.com/mongodb/mongo-csharp-driver/releases/tag/v2.19.0"}],"source":{"discovery":"EXTERNAL"},"title":"Deserializing compromised object with MongoDB .NET/C# Driver may cause remote code execution","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://security.netapp.com/advisory/ntap-20230324-0003/"},{"url":"https://jira.mongodb.org/browse/CSHARP-4475","tags":["x_transferred"]},{"url":"https://github.com/mongodb/mongo-csharp-driver/releases/tag/v2.19.0","tags":["x_transferred"]}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T15:10:59.481Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-11T19:19:47.914316Z","id":"CVE-2022-48282","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-11T19:20:08.556Z"}}]}}