Mongo Express - Unauthenticated Access
Mongo Express was able to be access with no authentication requirements in place.
Security Misconfiguration (SM)
How this template works
The API selection filters in this template specify the criteria for selecting the API endpoints to be tested. In this case, the filters include checking the response code to be between 200 and 299, and extracting the URL from the response to be used in subsequent requests.
The execute section defines the type of request to be executed and the requests to be made. In this template, a single request is made with the URL modified using the URL paths defined in the wordLists section.
The validation section specifies the criteria for validating the response of the executed request. In this template, the response code is expected to be 200, and the response payload should contain either the string '<title>Home - Mongo Express</title>' or '<title>system.users - Mongo Express</title>'. If the validation criteria are met, the test is considered successful.
Frequently asked questions
What is the impact of unauthenticated access to Mongo Express
What category does this vulnerability fall under
What is the severity level of this vulnerability
What are the potential risks associated with unauthenticated access to Mongo Express
What are the specific URL paths that are being tested in this scenario
What are the expected validation criteria for a successful test