NoSQL Injection
NoSQL injection is a vulnerability where an attacker is able to interfere with the queries that an application makes to a NoSQL database.
To find it test URLs parameters, body parameters, form fields, cookies (session, fehost, TrackingIds related to analytics and any non-standard field), User-Agent and any other non-standard Header.
Login Bypass
  • {"username":{"$regex": "admin.*"},"password":{"$ne":""}}
  • {"name":"username", "password": {"$ne":"0"}}
URL Parameters
  • Run a wordlist. When trying to fuzz a URL with a wordlist we need to do it with the '=' character in the payload position and without it there. Also, try it with and without URL encoding.
  • Try a boolean condition that always evaluates to true. For example: ?category=Gifts'||1||' or ?category=Gifts'||'a'=='a.
More payloads at: PayloadsAllTheThings.