Wombo
Summary
Discovered multiple open ports including Redis, MongoDB, and a NodeBB instance.
Redis (port 6379) was exposed and vulnerable to rogue server attack.
Used a public exploit to achieve unauthenticated RCE as root via Redis.
Gained a root shell directly without requiring privilege escalation.
π§΅ Let's Unpack
Enumeration
sudo nmap -sV -sC -p- -Pn 192.168.229.69 --openOpen Ports:
22/tcpβ OpenSSH 7.4p1 Debian80/tcpβ nginx 1.10.3 (default page)6379/tcpβ Redis 5.0.98080/tcpβ NodeBB forum interface27017/tcpβ MongoDB 4.0.18 (requires auth)
π Interesting Findings:
Redis port open to the world with no authentication required
NodeBB and MongoDB are red herrings (rabbit holes)
Initial Foothold
π― Target: Redis (port 6379)
πͺ Reverse shell received with root privileges
Privilege Escalation
β Not required.
Redis exploit gave direct root access, eliminating the need for additional privilege escalation steps.
Last updated