NoSQL injection
NoSQL databases provide looser consistency restrictions than traditional SQL databases. By requiring fewer relational constraints and consistency checks, NoSQL databases often offer performance and scaling benefits. Yet these databases are still potentially vulnerable to injection attacks, even if they aren't using the traditional SQL syntax.
Summary
Tools
Exploit
Authentication Bypass
Extract length information
Extract data information
Blind NoSQL
POST with JSON body
GET
MongoDB Payloads
References
Tools
Exploit
Authentication Bypass
Basic authentication bypass using not equal ($ne) or greater ($gt)
Extract length information
Extract data information
Extract data with "in"
Blind NoSQL
POST with JSON body
POST with urlencoded body
GET
MongoDB Payloads
References
Last updated