I reached the popular hacker who gave me the following comment:
“Everyone needs to pay attention to the new MEAN Stack. The more popular it’s becoming the more likely it is for it to have vulnerabilities. We all need to work together to find and fix them but also to practice better security hygiene.”
MEAN Stack replaced the LAMP Stack that was considered less secure, but GhostShell is remind us that also MEAN is affected by serious security issues that expose users to serious risks.
“MySQL typically replaced by NoSQL and the main database configuration managed by MongoDB. This project will focus solely on this poorly configured MongoDB. I’d like to mention exactly how easy it is to infiltrate within these types of networks but also how chilled sysadmins tend to be with their security measures.” wrote GhostShell on Pastebin.
GhostShell highlights the lack of security of many installations that doesn’t implement a proper authentication process. The vast majority of services scanned by GhostShell was simply protected by a single factor authentication (username/password) and below there is the list of typical open ports discovered by the expert:
22, 53, 80, 81, 110, 137, 143 443, 465, 993, 995, 3000, 8080, 27017, 3306, 6379, 8888, 28017, 64738, 25565
What does it mean?
It could very easy for attackers to compromise a network poorly databases, this is exactly what GhostShell has done and he is leaking more than 36 million accounts/records of internal data from these types of networks to raise awareness.
“This can basically lead to anyone infiltrating the network and managing their internal data without any interference. You don’t even have to elevate your privileges, you just connect and have total access. You can create new databases, delete existing ones, alter data, and so much more.” added GhostShell.
“I am leaking more than 36 million accounts/records of internal data from these types of networks to raise awareness about what happens when you decide not to even add a username/password as root or check for open ports, let alone encrypt the data. Each server folder has within it a plaintext file with the general info of the target, a screenshot from within my MongoDB client with me having access and of course the leaked data in raw text. There are a few million accounts with passwords and the rest is private person data or other types.”
The message published on PasteBin also includes the download links and the screenshots of the databases containing the exposed data.
Negligent administrators, be careful, GhostShell is behind you … and he isn’t the unique one.
Stay Tuned …
If you appreciate my effort in spreading cyber security awareness, please vote for Security Affairs as best European Security Blog. Vote SecurityAffairs in every section it is reported. I’m one of the finalists and I want to demonstrate that the Security Affairs community a great reality.
(Security Affairs – GhostShell, hacking)