Giter Site home page Giter Site logo

charlie-belmer / nosqli Goto Github PK

View Code? Open in Web Editor NEW
347.0 6.0 42.0 129 KB

NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.

Home Page: https://nullsweep.com

License: GNU Affero General Public License v3.0

Go 99.74% Shell 0.26%
nosql-injection nosql mongodb security-tools security-scanner security-automation security sqlinjection

nosqli's People

Contributors

beckler avatar charlie-belmer avatar legacy-charlie avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

nosqli's Issues

Cookie issues

Currently there is no way to pass a cookie via a parameter.
It can be done via request file. However cookie isn't send on redirects (like 302 Found with forms) and as a result nosqli Is not able to find the injection.

Support for DELETE http method

I want to test for nosql injection for a delete method to a specific endpoint. Since the delete request has no payload, nosqli exits as 'unexpected EOF' when I load the request template using -r flag. Here is the template that I'm using,

DELETE /path/to/endpoint/id HTTP/1.1
Host: my.hostname.com
Cookie: token=some_token
Sec-Ch-Ua: "Chromium";v="91", " Not;A Brand";v="99"
Accept: application/json
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36
Origin: my.hostname.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: my.hostname.com
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close

I want to test for injection in /path/to/endpoint/payload.

Is this currently possible? If yes, how?

Too Many Open Files Error

Hello - love your tool, only one that works well scanning for nosqli.

I am testing a POST request that eventually hits a mongoDB and checking for nosqli using your tool. The POST request is something like this and it seems to run for a long time and eventually comes up with an error from the Linux OS saying "2021/07/23 17:25:33 open nosqli_test_request.txt: too many open files". Is there something i am doing wrong or are there limitations to the number of nested arrays or number of parameters or something?

{ "tagId": "TAG_GUID", "userId": "USER_GUID", "metadata": { "cellSelection": { "columnId": "column_name", "taskId": "TASK_GUID", "rowIndex": 6 } } }

Using JSON data

I'm trying to scan an endpoint that expects JSON data. Not quite sure on how to pass this to NoSQLi. Currently doing the following:

./nosqli_macos_v0.5.4 scan -t http://localhost:3000/readsWithoutJs -d "{"name": "Bram"}"

But this does not seem to work. Is this possible?

Add a flag to skip a proxy's certificate check

To understand the tool better, I want to proxy the traffic through burp suite. It'll help me follow the payload better. However, the tool terminates with an error x509: certificate signed by unknown authority. It's be great to add a flag like --SkipCertificateCheck to bypass this.

NoSQLi hangs on boolean based scan on POST request

I've tried nosqli on several different routes where i found injection manually to get familiar with the tool.
I have a target with vulnerable params in request body. When i start nosqli against it - it hangs on boolean based scan .

I've tried using a file (request copied from Burp) and also run command with url and body params: result is same for both cases, so there should be no syntax problems .

Unfortunately, i cant share info about vulnerable app so you can try debug on your side but maybe u can help me with debugging: is there some kind of verbose mode so i can check details?

Also to add - I don't have the same problem on the same target for few other requests where noSQL injection exist - but for every of them GET method is used.

image

HTTPS in request file

Hi,
When using the Burp request file there is no option to set force-SSL or something like that, so the connection will be initiated through HTTPS nor HTTP.

Any recommendation?

Thanks

Malformed HTTP version

I copied and pasted an HTTP in a req packet obtained using Firefox network tools. Then, I ran this command:

$ nosqli scan -t https://<IP:PORT>/api/userinfo/dashboard?fc=1 -r req --insecure
2023/09/11 10:15:19 malformed HTTP version "HTTP/2"

It is a valid packet, it has not been modifed.

Any help?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.