Hacker News
MongoBleed
FridgeSeal
|next
[-]
> CVE-2025-14847 - MongoDB Unauthenticated Memory Leak Exploit
> A proof-of-concept exploit for the MongoDB zlib decompression vulnerability that allows unauthenticated attackers to leak sensitive server memory.
dpark
|next
|previous
[-]
erdaniels
|root
|parent
|next
[-]
So if you're using Atlas, check that your Cluster has auto upgraded already. If you're using 0.0.0.0/0, stop doing that and prefer a limited IP address range and even better, use VPC Peering or other security/network boundary features.
computerfan494
|root
|parent
|next
[-]
giancarlostoro
|root
|parent
|next
|previous
[-]
It has been a minute since I used Mongo for production grade projects, so some things could have changed since then.
ehnto
|root
|parent
[-]
Not that it is fool proof, but if I am setting up the infrastructure I can probably control where the DB is deployed, so I would colocate it with the application servers on a local network or virtual local network, that is all I would be comfortable with.
winstonwinston
|root
|parent
|previous
[-]
When it says “authenticated exploit” it means you need to pass authentication first in order to trigger exploit whatever it may be.
enether
|next
|previous
[-]
I'm not sure how Mongo's review process works, but it seems like this one had zero review.
FrostKiwi
|next
|previous
[-]
spzb
|next
|previous
[-]
https://doublepulsar.com/merry-christmas-day-have-a-mongodb-...
https://blog.ecapuano.com/p/hunting-mongobleed-cve-2025-1484...
spaquet
|next
|previous
[-]
beembeem
|root
|parent
[-]
https://www.mongodb.com/docs/v4.4/release-notes/4.4/#4.4.30-...