nosqli_auth_bypass
Test authentication bypass using NoSQL injection by sending payloads that exploit MongoDB query operators like $ne, $gt, and $regex to bypass password validation checks.
Instructions
Test NoSQL operator injection ($ne, $gt, $regex) for authentication bypass. Sends payloads that abuse MongoDB query operators to bypass password checks. E.g., {"username":"admin","password":{"$ne":""}} matches any non-empty password. Returns: {results: [{payload_name, status, length, likely_bypass, snippet}]}. Side effects: Sends POST requests to the login endpoint. May create sessions.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Login endpoint URL, e.g. https://target/login or https://target/api/auth | |
| username_param | No | JSON field name for username, e.g. 'username' or 'email' | username |
| password_param | No | JSON field name for password | password |
| target_username | No | Username to bypass auth for, e.g. 'admin' | admin |