MongoBleed

(github.com)

124 points by gpi42 days ago

7 comments

  • FridgeSeal42 days ago
    Current link points straight to the Python code without a lot of context, so here’s the top of the readme:<p>&gt; CVE-2025-14847 - MongoDB Unauthenticated Memory Leak Exploit<p>&gt; A proof-of-concept exploit for the MongoDB zlib decompression vulnerability that allows unauthenticated attackers to leak sensitive server memory.
  • dpark42 days ago
    Do people usually run Mongo in a mode that allows unauthenticated calls? I don’t know anything about Mongo. This just seems surprising.
    • erdaniels42 days ago
      No, but it&#x27;s pretty common IME to create an Atlas cluster that has internet-wide access (0.0.0.0&#x2F;0) when testing and forgetting to turn this off. According to <a href="https:&#x2F;&#x2F;jira.mongodb.org&#x2F;browse&#x2F;SERVER-115508" rel="nofollow">https:&#x2F;&#x2F;jira.mongodb.org&#x2F;browse&#x2F;SERVER-115508</a>, this affects unauthenticated ops. Based on the repro code itself, it looks like this happens way before authentication is checked for the corresponding OP at the OP_MSG decoding level.<p>So if you&#x27;re using Atlas, check that your Cluster has auto upgraded already. If you&#x27;re using 0.0.0.0&#x2F;0, stop doing that and prefer a limited IP address range and even better, use VPC Peering or other security&#x2F;network boundary features.
      • computerfan49442 days ago
        We received communication that all Atlas clusters were upgraded with the fix before the vulnerability was announced.
      • yearolinuxdsktp42 days ago
        This is a good example of a benefit of certificate-based authentication option for MongoDB, because you need to at least present a valid client certificate to transmit any data.
      • nailer39 days ago
        &gt; No, but it&#x27;s pretty common IME to create an Atlas cluster that has internet-wide access (0.0.0.0&#x2F;0) when testing and forgetting to turn this off.<p>That is a <i>ridiculous</i> default.
    • giancarlostoro42 days ago
      Its default is to only take connections that are local, usually I have my mongo clients SSH into a mongo server as opposed to opening up the port to the internet. Some Mongo users &#x2F; collections are very open by default.<p>It has been a minute since I used Mongo for production grade projects, so some things could have changed since then.
      • ehnto42 days ago
        I don&#x27;t think I would be comfortable serving any DB over the internet these days, exploit scanners are so agressand ubiquitous that a breach would feel inevitable.<p>Not that it is fool proof, but if I am setting up the infrastructure I can probably control where the DB is deployed, so I would colocate it with the application servers on a local network or virtual local network, that is all I would be comfortable with.
    • winstonwinston41 days ago
      When vulnerability description says “unauthenticated exploit” that means that you can exploit without being required to authenticate first. It means it just works even with authentication being required on the server.<p>When it says “authenticated exploit” it means you need to pass authentication first in order to trigger exploit whatever it may be.
  • enether41 days ago
    What an awful vulnerability. The most interesting fact is that this has been there since the PR that introduced it in 2017[1].<p>I&#x27;m not sure how Mongo&#x27;s review process works, but it seems like this one had zero review.<p>[1] - <a href="https:&#x2F;&#x2F;github.com&#x2F;mongodb&#x2F;mongo&#x2F;pull&#x2F;1152" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;mongodb&#x2F;mongo&#x2F;pull&#x2F;1152</a>
  • spzb42 days ago
    Good write ups:<p><a href="https:&#x2F;&#x2F;doublepulsar.com&#x2F;merry-christmas-day-have-a-mongodb-security-incident-9537f54289eb" rel="nofollow">https:&#x2F;&#x2F;doublepulsar.com&#x2F;merry-christmas-day-have-a-mongodb-...</a><p><a href="https:&#x2F;&#x2F;blog.ecapuano.com&#x2F;p&#x2F;hunting-mongobleed-cve-2025-14847" rel="nofollow">https:&#x2F;&#x2F;blog.ecapuano.com&#x2F;p&#x2F;hunting-mongobleed-cve-2025-1484...</a>
  • FrostKiwi40 days ago
    This is astronomical. If I correctly understood, the full on compromise of Ubisoft happened because of this.
  • spaquet40 days ago
    The problem is that about 20% of mongodb users are still on v4 for which not patch has been provided since it reach end of support on Feb 2024...
    • beembeem39 days ago
      Incorrect, the company patched 4.4 on 12&#x2F;19&#x2F;25 with a special 4.4.30 release:<p><a href="https:&#x2F;&#x2F;www.mongodb.com&#x2F;docs&#x2F;v4.4&#x2F;release-notes&#x2F;4.4&#x2F;#4.4.30---dec-19--2025" rel="nofollow">https:&#x2F;&#x2F;www.mongodb.com&#x2F;docs&#x2F;v4.4&#x2F;release-notes&#x2F;4.4&#x2F;#4.4.30-...</a>
  • winrid42 days ago
    Luckily most people wouldn&#x27;t use zlib anyway, they&#x27;d use snappy or zstd, and this also requires authenticated access to the cluster ....
    • mirashii42 days ago
      &gt; authenticated access to the cluster<p>No it doesn’t.<p>&gt; they&#x27;d use snappy or zstd<p>What is being used more doesn’t matter, what’s compiled in and enabled matters.