MongoDB is a cross-platform database that held a large amount of information that was completely unprotected. The system used a TCP port 27017 which held thousands of servers making it easy to access all of them once an exploit was used. German researches, Kai Grenshake, Eric Petryka, and Jens Heyens simply scanned for the port using “masscan”. The researchs had also said by using the Shodan Search Engine it would be even easier to locate the port and hack into the databases. The University of Saarland in Germany at the Centre for IT Security, where the researchers preformed these tests, made a statement saying “Anybody could retrieve and even alter several million items of customer data, including names, addresses, emails and credit card numbers,”.
The exploit itself could allow anyone to get into the database and read or alter any of the information listed and it did not require any kind of hacking tools. This is made even worse as these databases are used by several different organizations which used it to store customer information as well as personal information that many would most likely find valuable.
The exploit was explained to MongoDB before any incidents of it being used were reported. Those who used the program were urged to install the latest version which patched the issue by setting the network access to the localhost by default.