Is BasicDBObject.parse() secure against NoSQL injection attacks?












0















I'm using the mongo-java-driver for connection to my MongoDB.
So my questions are about using MongoDB with a Java client:




  • Is com.mongodb.BasicDBObject.parse(userInput) secure against NoSQL injection attacks?

  • Or do I have to sanitize the userInput String before parsing?

  • If I have to sanitize the input: Are there special methods for sanitizing shipped with mongo-java-driver?

  • Or shall I use basicDBObject.put( "foo", "bar" ) instead?


The MongoDB documentation describes a strict mode:




  • Does this strict mode sanitize the input?

  • How do I activate the strict mode when parsing?


The OWASP guide describe several MongoDB injection attacks.
And it is unclear, if BasicDBObject.parse() sanitizes the input itself.










share|improve this question





























    0















    I'm using the mongo-java-driver for connection to my MongoDB.
    So my questions are about using MongoDB with a Java client:




    • Is com.mongodb.BasicDBObject.parse(userInput) secure against NoSQL injection attacks?

    • Or do I have to sanitize the userInput String before parsing?

    • If I have to sanitize the input: Are there special methods for sanitizing shipped with mongo-java-driver?

    • Or shall I use basicDBObject.put( "foo", "bar" ) instead?


    The MongoDB documentation describes a strict mode:




    • Does this strict mode sanitize the input?

    • How do I activate the strict mode when parsing?


    The OWASP guide describe several MongoDB injection attacks.
    And it is unclear, if BasicDBObject.parse() sanitizes the input itself.










    share|improve this question



























      0












      0








      0








      I'm using the mongo-java-driver for connection to my MongoDB.
      So my questions are about using MongoDB with a Java client:




      • Is com.mongodb.BasicDBObject.parse(userInput) secure against NoSQL injection attacks?

      • Or do I have to sanitize the userInput String before parsing?

      • If I have to sanitize the input: Are there special methods for sanitizing shipped with mongo-java-driver?

      • Or shall I use basicDBObject.put( "foo", "bar" ) instead?


      The MongoDB documentation describes a strict mode:




      • Does this strict mode sanitize the input?

      • How do I activate the strict mode when parsing?


      The OWASP guide describe several MongoDB injection attacks.
      And it is unclear, if BasicDBObject.parse() sanitizes the input itself.










      share|improve this question
















      I'm using the mongo-java-driver for connection to my MongoDB.
      So my questions are about using MongoDB with a Java client:




      • Is com.mongodb.BasicDBObject.parse(userInput) secure against NoSQL injection attacks?

      • Or do I have to sanitize the userInput String before parsing?

      • If I have to sanitize the input: Are there special methods for sanitizing shipped with mongo-java-driver?

      • Or shall I use basicDBObject.put( "foo", "bar" ) instead?


      The MongoDB documentation describes a strict mode:




      • Does this strict mode sanitize the input?

      • How do I activate the strict mode when parsing?


      The OWASP guide describe several MongoDB injection attacks.
      And it is unclear, if BasicDBObject.parse() sanitizes the input itself.







      mongodb security mongo-java






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Nov 27 '18 at 10:11







      Matthias M

















      asked Nov 26 '18 at 21:08









      Matthias MMatthias M

      3,83954460




      3,83954460
























          1 Answer
          1






          active

          oldest

          votes


















          1















          1. com.mongodb.BasicDBObject.parse() is not safe against NOSQL Injection

          2. sanitizing is a good thing for fighting against Injection in general but is not enought

          3. There is some OWASP guidelines here for fighting NOSQL Injection : https://www.owasp.org/index.php/Injection_Prevention_Cheat_Sheet_in_Java#Example_-_MongoDB


          I recommend you to have a look at Hibernate OGM if you want to do parametrization of the query : http://hibernate.org/ogm/documentation/. Parametrization is the only solution for fighting Injection






          share|improve this answer























            Your Answer






            StackExchange.ifUsing("editor", function () {
            StackExchange.using("externalEditor", function () {
            StackExchange.using("snippets", function () {
            StackExchange.snippets.init();
            });
            });
            }, "code-snippets");

            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "1"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });














            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53489100%2fis-basicdbobject-parse-secure-against-nosql-injection-attacks%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            1















            1. com.mongodb.BasicDBObject.parse() is not safe against NOSQL Injection

            2. sanitizing is a good thing for fighting against Injection in general but is not enought

            3. There is some OWASP guidelines here for fighting NOSQL Injection : https://www.owasp.org/index.php/Injection_Prevention_Cheat_Sheet_in_Java#Example_-_MongoDB


            I recommend you to have a look at Hibernate OGM if you want to do parametrization of the query : http://hibernate.org/ogm/documentation/. Parametrization is the only solution for fighting Injection






            share|improve this answer




























              1















              1. com.mongodb.BasicDBObject.parse() is not safe against NOSQL Injection

              2. sanitizing is a good thing for fighting against Injection in general but is not enought

              3. There is some OWASP guidelines here for fighting NOSQL Injection : https://www.owasp.org/index.php/Injection_Prevention_Cheat_Sheet_in_Java#Example_-_MongoDB


              I recommend you to have a look at Hibernate OGM if you want to do parametrization of the query : http://hibernate.org/ogm/documentation/. Parametrization is the only solution for fighting Injection






              share|improve this answer


























                1












                1








                1








                1. com.mongodb.BasicDBObject.parse() is not safe against NOSQL Injection

                2. sanitizing is a good thing for fighting against Injection in general but is not enought

                3. There is some OWASP guidelines here for fighting NOSQL Injection : https://www.owasp.org/index.php/Injection_Prevention_Cheat_Sheet_in_Java#Example_-_MongoDB


                I recommend you to have a look at Hibernate OGM if you want to do parametrization of the query : http://hibernate.org/ogm/documentation/. Parametrization is the only solution for fighting Injection






                share|improve this answer














                1. com.mongodb.BasicDBObject.parse() is not safe against NOSQL Injection

                2. sanitizing is a good thing for fighting against Injection in general but is not enought

                3. There is some OWASP guidelines here for fighting NOSQL Injection : https://www.owasp.org/index.php/Injection_Prevention_Cheat_Sheet_in_Java#Example_-_MongoDB


                I recommend you to have a look at Hibernate OGM if you want to do parametrization of the query : http://hibernate.org/ogm/documentation/. Parametrization is the only solution for fighting Injection







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Nov 30 '18 at 10:41









                SPointSPoint

                1427




                1427
































                    draft saved

                    draft discarded




















































                    Thanks for contributing an answer to Stack Overflow!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53489100%2fis-basicdbobject-parse-secure-against-nosql-injection-attacks%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    A CLEAN and SIMPLE way to add appendices to Table of Contents and bookmarks

                    Calculate evaluation metrics using cross_val_predict sklearn

                    Insert data from modal to MySQL (multiple modal on website)