How Rocket.Chat Got Hacked Without a Single Correct Password
In March 2021, security researchers disclosed a critical vulnerability in Rocket.Chat — an open-source messaging platform used by thousands of companies including government agencies, banks, and tech firms as a self-hosted Slack alternative.
The vulnerability was rated CVSS 9.8 — Critical. All Rocket.Chat installations before version 3.11.2 were affected. This wasn't a fringe product — Rocket.Chat had over 12 million users at the time of disclosure.
What made it possible?
The server was built on MongoDB — a NoSQL database used by Airbnb, eBay, Forbes, and thousands of startups. Unlike traditional SQL databases, MongoDB uses JSON-like query operators. The developers forgot that a user could send one of those operators as their input, and the database would happily execute it.
This module teaches you how it works, why it works, and how to find it yourself — on a real MongoDB database running inside your lab.
What was the CVE identifier for the Rocket.Chat NoSQL injection vulnerability?
The attacker didn't need a valid account to exploit CVE-2021-22911. Which endpoint were they targeting?