NoSQL injection

NoSQL databases provide looser consistency restrictions than traditional SQL databases. By requiring fewer relational constraints and consistency checks, NoSQL databases often offer performance and scaling benefits. Yet these databases are still potentially vulnerable to injection attacks, even if they aren't using the traditional SQL syntax.

Summary

  • Tools

  • Exploit

    • Authentication Bypass

    • Extract length information

    • Extract data information

  • Blind NoSQL

    • POST with JSON body

    • GET

  • MongoDB Payloads

  • References

Tools

Exploit

Authentication Bypass

Basic authentication bypass using not equal ($ne) or greater ($gt)

Extract length information

Extract data information

Extract data with "in"

Blind NoSQL

POST with JSON body

POST with urlencoded body

GET

MongoDB Payloads

References

Last updated