Wombo
Summary
Discovered multiple open ports including Redis, MongoDB, and a NodeBB instance.
Redis (port 6379) was exposed and vulnerable to rogue server attack.
Used a public exploit to achieve unauthenticated RCE as root via Redis.
Gained a root shell directly without requiring privilege escalation.
🧵 Let's Unpack
Enumeration
Open Ports:
22/tcp
→ OpenSSH 7.4p1 Debian80/tcp
→ nginx 1.10.3 (default page)6379/tcp
→ Redis 5.0.98080/tcp
→ NodeBB forum interface27017/tcp
→ MongoDB 4.0.18 (requires auth)
📌 Interesting Findings:
Redis port open to the world with no authentication required
NodeBB and MongoDB are red herrings (rabbit holes)
Initial Foothold
🎯 Target: Redis (port 6379)
🪝 Reverse shell received with root privileges
Privilege Escalation
❌ Not required.
Redis exploit gave direct root access, eliminating the need for additional privilege escalation steps.
Last updated
Was this helpful?