Это не пропаганда ЛГБТ, они просто дырявые и это факт
дальше надеюсь Ынжинеры сей чудесной конторы узнают свои творения (к вам притензий нет, вам менеджмент сказал, вы сказал Можем)
Responsible Disclosure: Critical Vulnerability in OpenClaw (C****.ru Marketplace)
To: C****.ru Security Team / C**** Evolution Team
From: SENTINEL Strike Force (Red Team)
Date: 2026-02-06
Severity: CRITICAL (9.8 CVSS)
Impact: Remote Code Execution (RCE), Cloud Identity Theft
Reference: CVE-2026-25253 (Moltbit/OpenClaw RCE)
1. Executive Summary
We have identified a critical risk in the OpenClaw image on the C****.ru Marketplace.
REAL DATA: Public OSINT sources (Shodan, Hunt.io) confirm thousands of instances exposed globally on Port 18789 due to the default 0.0.0.0 binding used in Docker templates.
Users deploying this image on Evolution Free Tier (which defaults to permissive Security Groups) are compromised immediately.
2. Technical Evidence (OSINT & Replication)
A. The "Port 18789" Exposure
Fact: OpenClaw binds its unauthenticated Admin API to
0.0.0.0:18789by default.Evidence: Shodan queries for
port:18789reveal operational dashboards accessible from the public internet.Impact: Any user deployment without a custom Firewall Policy is fully exposed.
B. Confirmed Exploitation Path
Recon: Attacker scans C****.ru IP ranges for Port 18789.
Access:
GET /dashboardreturns the Admin UI (No Auth).RCE:
POST /api/execallows runningcurlorbashscripts.Cloud Breakout:
curl 169.254.169.254retrieves IAM Metadata credentials (stolen cloud identity).
3. Verification Protocol (For C****.ru Team)
Do not rely on simulation. Verify this on your own platform:
Deploy a new OpenClaw instance from your Marketplace.
Run:
curl -I http://[INSTANCE_IP]:18789/Expected Result:
HTTP 200 OK(Admin Panel).Safe Result:
Connection Refused(Required outcome).
4. Remediation Steps (Mandatory Fixes)
1. Update Default Config (Critical)
Change docker-compose.yml binding:
ports: - "127.0.0.1:18789:18789" # WAS 0.0.0.0:18789
2. Default Security Group
Ensure the Marketplace template applies a strict Security Group:
Ingress: Allow SSH (22) ONLY.
Block: ALL other inbound TCP.
3. Warning Banner
Add a disclaimer: "This image is for Localhost Use via SSH Tunnel only. Do not expose to Public IP."
Appendix: Technical Artifacts (For Verification)
A. Discovery Dorks (OSINT)
Security teams can identify vulnerable assets using these signatures:
Shodan:
port:18789 product:"Moltbot" http.title:"Dashboard"Censys:
services.port: 18789 AND services.http.response.body: "gatewayUrl"Hunt.io:
product.name:"OpenClaw" protocol:"http" port:18789
B. Fingerprinting (HTTP Headers)
A vulnerable instance typically returns:
HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Access-Control-Allow-Origin: * Server: Moltbot-Gateway/1.2.9 Date: Fri, 06 Feb 2026 10:00:00 GMT Content-Length: 452
Note: The Access-Control-Allow-Origin: * header confirms the CSRF vulnerability.
C. Configuration Leak (JSON Sample)
Requesting GET /api/config on an exposed instance returns critical infrastructure details:
{ "gatewayUrl": "ws://хх.128.0.5:18789", "agentId": "agent-8f2a1...", "permissions": { "exec": true, "filesystem": true }, "llmProvider": "openai", "version": "1.2.9" }
Generated by SENTINEL Strike Force.
Дети, не ходите в Африку гулять, ну и не используйте этого бота, ну если очень хотите, то настоятельно рекомендую со мной связаться, чтобы я его под ваши нужды сделал безопасным.
Вы делаете ваших клиентов уязвимыми нереально небезопасными в интернете.
