rspec/rules/S5147/common/fix/code-rationale.adoc

3 lines
367 B
Plaintext

The following code is vulnerable to a NoSQL injection because the database query is built using untrusted JavaScript objects that are extracted from user inputs.
Here the application assumes the user-submitted parameters are always strings, while they might contain more complex structures. An array or dictionary input might tamper with the expected query behavior.