3 lines
367 B
Plaintext
3 lines
367 B
Plaintext
![]() |
The following code is vulnerable to a NoSQL injection because the database query is built using untrusted JavaScript objects that are extracted from user inputs.
|
||
|
|
||
|
Here the application assumes the user-submitted parameters are always strings, while they might contain more complex structures. An array or dictionary input might tamper with the expected query behavior.
|