MongoDB - Port 27017, 27018
Basic info
Why MongoDB is a Prime Target
Key Ports
Port
Service
Description
MongoDB Architecture & Security Overview <a name="architecture"></a>
Database Structure
Default Databases
Authentication Mechanisms
Authorization Model
Reconnaissance & Information Gathering
1. Network Scanning
2. OSINT & Shodan Reconnaissance
3. Fingerprinting MongoDB Version
4. Banner Grabbing
Enumeration Techniques
1. Checking Authentication Requirements
2. Database Enumeration
3. Targeted Collection Queries
4. Searching for Sensitive Data
Authentication & Authorization Testing
1. Default Credentials Testing
2. Brute Force Attacks
3. Authentication Bypass Techniques
4. Privilege Escalation
Exploitation Techniques
1. Data Exfiltration
2. Malicious Data Injection
3. Server-Side JavaScript Execution
4. Denial of Service Attacks
Post-Exploitation
1. Persistence Mechanisms
2. Lateral Movement
3. Pivoting Through MongoDB
Critical Vulnerabilities
1. CVE-2025-14847: MongoBleed (Memory Disclosure)
2. CVE-2020-7928: Privilege Escalation
3. MongoDB Injection Vulnerabilities
4. ObjectId Prediction (IDOR)
Defense & Hardening
1. Authentication & Authorization
2. Network Security
3. Encryption
4. Disable Dangerous Features
5. Auditing & Logging
6. Regular Security Practices
7. Configuration Hardening Checklist
Practical Lab Scenarios <a name="lab-scenarios"></a>
Scenario 1: Unauthenticated MongoDB
Scenario 2: NoSQL Injection
Scenario 3: Privilege Escalation
Scenario 4: MongoBleed Exploitation
Conclusion
Additional Resources
Tools
Last updated