TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Finding MongoDB instances without any authentication

131 pointsby yammesickaalmost 10 years ago

7 comments

_pdp_almost 10 years ago
This information is dangerous :)<p>A while back I published research on open, unauthenticated ICA (Citrix) instances that could be found by doing basic google queries. I was able to find a lot of interesting targets including some belonging to military and government organisations. I published my findings regarding the discovery without including any details. The blog post was very vague. Anyway, it doesn&#x27;t take a rocket scientist to figure out what&#x27;s going on once you know the basics. Someone did exactly this and wrecked a few systems. I was contacted later by the effected organisations holding me directly responsible for the damage that was inflicted. I had no involvement whatsoever but the information that I provided was crucial for the discovery of these targets. This was when I realised that regardless how cool is to publish security research you should always take the necessary steps to ensure that no one is harmed.
评论 #9912561 未加载
评论 #9911810 未加载
评论 #9912708 未加载
评论 #9912713 未加载
评论 #9912596 未加载
评论 #9912050 未加载
评论 #9913560 未加载
评论 #9913844 未加载
obblekkalmost 10 years ago
FYI: if you don&#x27;t want to pay shodan for search results, you could run your own port scan using masscan(<a href="https:&#x2F;&#x2F;github.com&#x2F;robertdavidgraham&#x2F;masscan" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;robertdavidgraham&#x2F;masscan</a>) by running the command<p><pre><code> masscan -p27017 0.0.0.0&#x2F;0 --excludefile data&#x2F;exclude.conf </code></pre> Be warned that this will scan the entire IPv4 namespace.
评论 #9914174 未加载
nodesocketalmost 10 years ago
I honestly blame DigitalOcean a bit for not providing a VPC and&#x2F;or a centralized firewall. It is tedious to configure iptables rules on each server and easy to overlook and make mistakes.<p>Furthermore, it should be the job of the firewall to limit access to server interfaces&#x2F;ports, not the services inside of servers. Binding on 0.0.0.0 seems perfectly acceptable, especially for cluster&#x2F;distributed services that talk amoung themselves.
joepie91_almost 10 years ago
Holy crap, TWO YEARS to patch an insecure default?<p>Sorry, but if you&#x27;re using MongoDB in production, this is the point where you should start reconsidering that. Two years to patch such a gaping security hole, regardless of any &#x27;breakage&#x27;, is <i>completely</i> unacceptable.
评论 #9912787 未加载
评论 #9912977 未加载
评论 #9913714 未加载
jakobdaboalmost 10 years ago
Can&#x27;t malware&#x2F;bots use these databases for communication?
评论 #9911898 未加载
评论 #9912907 未加载
nevi-mealmost 10 years ago
Am I right that HackedDB could be because someone who noticed the lack of authentication created such database?<p>If I can connect to an instance without auth, I can also create a DB and collections etc.
评论 #9912442 未加载
joshstuartalmost 10 years ago
I just reached out to a very big &quot;startup&quot; that had many many GeeBees available publicly. Such a rookie mistake!