NoSQL Injection - MongoDB (Time Based)
- Risk:
High
- Type:
- Active
- CWE:
- 943
- Summary
- MongoDB query injection may be possible.
- Solution
- Do not trust client side input and escape all data on the server side. Avoid to use the query input directly into the where and group clauses and upgrade all drivers at the latest available version.
- Other info
- Through the where or group MongoDB clauses, Javascript sleep function is probably executable.
- References