Description
It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16. Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash.
Remediation
References
Related Vulnerabilities
PHP Out-of-bounds Write Vulnerability (CVE-2021-21704)
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2020-11113)
WordPress Plugin Build App Online SQL Injection (1.0.18)
Internet Information Services Other Vulnerability (CVE-2000-0951)
WordPress Plugin WPFront Notification Bar Cross-Site Scripting (2.0.0.07176)