webProeasy

Lab 326 — PulseBoard — NoSQL Injection in Authentication

hackadvisor

Task: Team analytics dashboard with login form vulnerable to NoSQL injection. Solution: Used MongoDB $ne operator injection (username[$ne]=user&password[$ne]=xxx) to bypass authentication and login as admin to access flag in admin panel.

$ ls tags/ techniques/
nosql_injection_ne_operatormongodb_query_operator_injection

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups