Mongo Express - Unauthenticated Access
ID: unauthenticated-mongo-express
Severity: high
Author: dhiyaneshDK,b0rn2r00t
Tags: mongo,unauth,edb,misconfig
Description
Section titled “Description”Mongo Express was able to be access with no authentication requirements in place.
YAML Source
Section titled “YAML Source”id: unauthenticated-mongo-express
info: name: Mongo Express - Unauthenticated Access author: dhiyaneshDK,b0rn2r00t severity: high description: Mongo Express was able to be access with no authentication requirements in place. reference: - https://www.exploit-db.com/ghdb/5684 classification: cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: mongo-express_project product: mongo-express shodan-query: title:"Home - Mongo Express" tags: mongo,unauth,edb,misconfig
http: - method: GET path: - '{{BaseURL}}' - '{{BaseURL}}/mongo-express/' - '{{BaseURL}}/db/admin/system.users'
matchers-condition: and matchers: - type: word words: - '<title>Home - Mongo Express</title>' - '<title>system.users - Mongo Express</title>' condition: or
- type: status status: - 200# digest: 4a0a00473045022100df3e7373b87cfb707ea3a136bfd75f2659799b37a8d5778442c4c52ae5a67c8e0220757c9fb5eef95e48eba01bcb14629ddbc96321bacbba92feceb2c772602d47a1:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/misconfiguration/unauthenticated-mongo-express.yaml"