NoSQL Injection in loopback-connector-mongodb
High severity
GitHub Reviewed
Published
Jun 4, 2019
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
Jun 4, 2019
Published to the GitHub Advisory Database
Jun 4, 2019
Last updated
Jan 9, 2023
Versions of
loopback-connector-mongodb
before 3.6.0 are vulnerable to NoSQL injection.MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous
$where
property to be passed to the MongoDB Driver. The Driver allows the special$where
property in a filter to execute JavaScript (client can pass in a malicious script) on the database Driver. This is an intended feature of MongoDB unless disabled (instructions here).A proof of concept malicious query:
The above makes the database sleep for 5 seconds and then returns all “Posts” with the title containing the word
Hello
.Recommendation
Update to version 3.6.0 or later.
References