Skip to content

Conversation

@xaitax
Copy link
Contributor

@xaitax xaitax commented Jan 2, 2026

New Features Added

  1. CHECK Action (Wiz Magic Packet)

    • Quick vulnerability detection using single crafted packet
    • Based on Wiz Research Nuclei template technique
    • set ACTION CHECK then run
  2. Compression Pre-flight Check

    • Detects server's supported compressors via hello command
    • Warns/stops if zlib not enabled (required for CVE)
    • Displays available compressors
  3. Connection Reuse

    • New REUSE_CONNECTION option (default: true)
    • Persistent TCP connection instead of reconnect per probe
    • Significant speed improvement
  4. Improved Leak Extraction

    • Printable ASCII sequences (6+ chars)
    • MongoDB connection string patterns (mongodb://)
    • JSON/BSON fragment detection
    • Broader quoted string extraction
  5. JSON Export

    • New SAVE_JSON option (default: true)
    • Structured report with offsets, base64 data, timestamps, secrets
    • Machine-parseable for automation

@msutovsky-r7 msutovsky-r7 self-assigned this Jan 5, 2026
Comment on lines +46 to +47
6. `set ACTION CHECK` then `run` (optional - quick vulnerability check)
7. `set ACTION SCAN` then `run` (full exploitation)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why set ACTION instead of using check and run directly?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AFAIK doesn't exist for aux.

'dd070000', # originalOpcode (OP_MSG = 2013)
'32000000', # uncompressedSize (50 - inflated)
'02', # compressorId (zlib = 2)
'789c636080028144064620050002ca0073' # zlib compressed payload
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can be even cooler here and use something like Zlib::Deflate.deflate("{\"a\": 1}")

#
# Quick vulnerability check using Wiz Research magic packet
#
def run_check(ip)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There are already a handful of mongodb modules in metasploit, it would make sense to split the fingerprinting parts of this functions into a mixin.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants