What is a NoSQL injection vulnerability?

NoSQL databases (also known as non-relational) do not use SQL for queries. There are a variety of different types of NoSQL databases, such as:

  • Key-Value
  • Key-Document
  • Column-Family
  • Graph

NoSQL was designed as an answer for flexible design methodologies. Relational databases (SQL) require schemas to be defined in advance and do not allow them to be updated when the βρίσκονται ήδη στη βάση δεδομένων. Η προσθήκη νέων πεδίων απαιτεί τη μετ of the database to a new schema, which can be time-consuming.

NoSQL attack

While NoSQL databases, such as MongoDB, do not use SQL for queries, they still query based on user input.

The main difference between SQL and NoSQL injection is the grammar and syntax of the query. NoSQL databases do not have a standard language. However, the syntax of their languages ​​is similar (since they are designed to do the same thing).

A NoSQL injection application is an attack on web applications created in the MEAN stack (MongoDB, Express, Angular and Node). When transmitting data, MEAN applications use JSON, which is the same thing used by MongoDB. Penetration of JSON code into a MEAN application can enable injection attacks on a MongoDB database.

For example, the above screenshot (from NullSweep ) shows an application that is vulnerable to NoSQL. From a request, the code pulls one user and a password and puts it into a MongoDB query. By passing the JSON {“username”: “myaccount”, “password”: {“$ne”: 1}} , an attacker could authenticate to without password.

MongoDB and other NoSQL databases are commonly used in web applications. For example, a website might request user account credentials on a web form, store authentication information in a MongoDB database, and perform credential checks using JavaScript.

Strict integration of MongoDB in JavaScript and other programming languages ​​means that NoSQL attacks can be used to execute attacks at other levels. A NoSQL injection attack that includes JavaScript code will allow this code to be executed within the web application.

 

NoSQL injection protection against attacks

NoSQL injection attacks are very similar to SQL injection attacks: they exploit the poor resolution of user input when creating database queries. This means that the same tools for protection against SQL injection attacks also work for NoSQL, such as:

NoSQL databases are still databases, which means that it's often important to run queries using user-supplied data. As with SQL databases, it is important to ensure that information is properly sanitized before using it in a query to minimize of an application to injection attacks.

 

Πηγές

  1. Foreword, OWASP
  2. 2019 CWE Top 25 Most Dangerous Software Errors, Common Weakness Enumeration
  3. NoSQL Databases Explained, MongoDB
  4. NoSQL Injection, RangeForce (Medium)
  5. A NoSQL Injection Primer (with Mongo), NullSweep

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).