Skip to content

Security issue, listening public incoming connections by default #411

Closed
@GenaANTG

Description

@GenaANTG

Guys, please explain me some moments about a mongodb configuration file.

There we have moving a mongodb config:
https://github.com/docker-library/mongo/blob/master/4.2/Dockerfile#L98

There we have a CMD directive:
https://github.com/docker-library/mongo/blob/master/4.2/Dockerfile#L108

And this block, with arguments checking:
https://github.com/docker-library/mongo/blob/master/4.2/docker-entrypoint.sh#L346-L356

Are you really run naked mongodb instance? You are moving mongodb config away, but don't use this config.

We have running staging mongodb instance. And this instance was hacked after some hours after project running :D Because mongodb by default is running with those params: mongod --bind_ip_all.

By default everyone can connect to a public mongodb instance. I suppose, that better way is using the mongodb config by default with a local interface binding. What do you think?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions