linuxWombo

Summary

  • Discovered multiple open ports including Redis, MongoDB, and a NodeBB instance.

  • Redis (port 6379) was exposed and vulnerable to rogue server attack.

  • Used a public exploit to achieve unauthenticated RCE as root via Redis.

  • Gained a root shell directly without requiring privilege escalation.

🧡 Let's Unpack

Enumeration

sudo nmap -sV -sC -p- -Pn 192.168.229.69 --open

Open Ports:

  • 22/tcp β†’ OpenSSH 7.4p1 Debian

  • 80/tcp β†’ nginx 1.10.3 (default page)

  • 6379/tcp β†’ Redis 5.0.9

  • 8080/tcp β†’ NodeBB forum interface

  • 27017/tcp β†’ MongoDB 4.0.18 (requires auth)

πŸ“Œ Interesting Findings:

  • Redis port open to the world with no authentication required

  • NodeBB and MongoDB are red herrings (rabbit holes)


Initial Foothold

🎯 Target: Redis (port 6379)

  • πŸͺ Reverse shell received with root privileges


Privilege Escalation

❌ Not required.

Redis exploit gave direct root access, eliminating the need for additional privilege escalation steps.

Last updated