Conversation
Edited 1 hour ago

Merry Christmas to everybody, except that dude who works for Elastic, who decided to drop an unauthenticated exploit for MongoDB on Christmas Day, that leaks memory and automates harvesting secrets (e.g. database passwords)

CVE-2025-14847 aka MongoBleed

Exp: https://github.com/joe-desimone/mongobleed/blob/main/mongobleed.py

This one is incredibly widely internet facing and will very likely see mass exploitation and impactful incidents

Impacts every MongoDB version going back a decade.

Shodan dork: product:"MongoDB"

10
19
0

@GossiTheDog oh for fuck's sake, what an asshole time to drop that one

0
0
0

@GossiTheDog
At least they have the decency to wait till Christmas unlike log4j

0
0
0

The exploit is real and works, you can just run it and target specific offsets and/or keep running it until you get AWS secrets and such.

2
4
0

@GossiTheDog crappy timing but looks like it was a bit earlier than that. https://jira.mongodb.org/browse/SERVER-115508

1
0
0
@GossiTheDog Maybe you are confusing MariaDB with MongoDB in their relation to MySQL?
1
0
4

@buherator fair, I edited the MySQL word out

0
0
1

@GossiTheDog .oO( Surely nobody exposes mongodb towards the inter-| OMGWTFBBQsrsly?

1
0
0

@GossiTheDog who the fuck exposes a DB directly to the internet?

1
0
0

@nblr @GossiTheDog ofc not, I bet on aistartups and governments :3
All information should be FREE!
Except the personal one ;-)

0
0
0

@GossiTheDog I am having a bit of trouble getting worked up about this.
The bug went public six days before Christmas. This means, frankly, that the folks who get paid to be bad actors, of which there are rather many nowadays, have had six days to figure out how to exploit it. I'm sure several of them had already figured it out before the Eclipse dude dropped the exploit.
By making the urgency of patching this issue clear, he has arguably done a public service.

1
1
0

@jik nobody is telling you to get worked up ๐Ÿ˜…

0
0
0