Injection: NoSQL Injection¶
Identifier:
nosql
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
NoSQL injection vulnerabilities occur when applications build NoSQL queries using untrusted user input, allowing attackers to manipulate queries and potentially access or modify sensitive data.
How we test: We inject NoSQL injection payloads into request parameters and analyze responses to detect if NoSQL queries are executed. We test for various NoSQL injection techniques including MongoDB, CouchDB, and other NoSQL database-specific attacks, and check if user input is properly validated before being used in database queries.
Execution conditions (BLST):
- Runs when this test is enabled, arguments are present, and coverage is OK, EMPTY_RESPONSE, VALIDATION_ERROR, or SERVER_ERROR.
- Response pattern analysis runs only when response text is non-empty and coverage is not SERVER_UNREACHABLE, TIMEOUT, RATE_LIMIT, REDIRECTION, GENERIC_ERROR, or UNAUTHORIZED.
References:
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.