Security Experts:

Connect with us

Hi, what are you looking for?


Identity & Access

Internet-Exposed Sphinx Servers at Risk of Attacks

All Sphinx servers that are exposed to the Internet are prone to abuse by cybercriminals, as they can be accessed by anyone, CERT-Bund warns.

All Sphinx servers that are exposed to the Internet are prone to abuse by cybercriminals, as they can be accessed by anyone, CERT-Bund warns.

An open source search engine often used as a backend for web applications, Sphinx is popular among e-commerce developers and merchants due to fast full-text search capabilities, integration with popular database management systems, and support for a range of programming languages.

The issue with any Sphinx server, however, is that, in the default configuration, it listens on ports 9306/TCP and 9312/TCP on all network interfaces.

With no authentication mechanisms available, any Sphinx server that is openly accessible from the Internet could be abused by attackers to read, modify or delete any data stored in the Sphinx database, Germany’s CERT-Bund points out.

One can check whether their Sphinx server is accessible from the Internet by running ‘netcat’ from a machine outside the local network and using the IP address of the host to check. If the server is exposed to the Web and a connection is successfully established, the version information will be returned.

To keep Sphinx servers secure, one would simply need to ensure they are not exposed to the Internet. Admins can also restrict access to the Sphinx server to trusted systems and should consider blocking any incoming connections from the Web to ports 9306/TCP and 9312/TCP.

“If both the Web and Sphinx servers are running on the same system, the Sphinx server should only listen on the localhost interface,” Germany’s Computer Emergency Response Team also notes.

Related: AWS S3 Buckets Exposed Millions of Facebook Records

Related: Organizations Expose Sensitive Data via Malware Analysis Sandboxes

Related: New ‘Xwo’ Malware Looks for Exposed Services, Default Passwords

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.