> CVE-2025-14847 - MongoDB Unauthenticated Memory Leak Exploit
> A proof-of-concept exploit for the MongoDB zlib decompression vulnerability that allows unauthenticated attackers to leak sensitive server memory.
No it doesn’t.
> they'd use snappy or zstd
What is being used more doesn’t matter, what’s compiled in and enabled matters.
I'm not sure how Mongo's review process works, but it seems like this one had zero review.
https://www.mongodb.com/docs/v4.4/release-notes/4.4/#4.4.30-...
dpark•1mo ago
giancarlostoro•1mo ago
It has been a minute since I used Mongo for production grade projects, so some things could have changed since then.
ehnto•1mo ago
Not that it is fool proof, but if I am setting up the infrastructure I can probably control where the DB is deployed, so I would colocate it with the application servers on a local network or virtual local network, that is all I would be comfortable with.
erdaniels•1mo ago
So if you're using Atlas, check that your Cluster has auto upgraded already. If you're using 0.0.0.0/0, stop doing that and prefer a limited IP address range and even better, use VPC Peering or other security/network boundary features.
computerfan494•1mo ago
yearolinuxdsktp•1mo ago
nailer•1mo ago
That is a ridiculous default.
winstonwinston•1mo ago
When it says “authenticated exploit” it means you need to pass authentication first in order to trigger exploit whatever it may be.