nosqli_detect
Detect NoSQL injection vulnerabilities by testing MongoDB operator injection in query parameters and JSON body. Identifies injection points using payloads for $ne, $gt, $regex, and $where operators.
Instructions
Test NoSQL injection detection in query parameters. Tests MongoDB operator injection ($ne, $gt, $regex, $where) in GET parameters and JSON body to detect NoSQL injection points. Returns: {baseline, results: [{payload_name, status, length, different}], injectable}. Side effects: Read-only. Sends ~10 requests.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | URL with query parameter to test, e.g. https://target/api/products?category=Gifts | |
| parameter | Yes | Parameter name to test for NoSQL injection | |
| method | No | HTTP method | GET |
| content_type | No | 'query' for URL params, 'json' for JSON body | query |