User Input in $where JavaScript
Untrusted data is directly interpolated into MongoDB $where clauses that execute JavaScript.
NoSQL injection vulnerability where untrusted data is interpolated into the $where clause, which executes JavaScript on the MongoDB server, potentially allowing attackers to execute arbitrary JavaScript on the database, exposing or modifying data.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Untrusted data is directly interpolated into MongoDB $where clauses that execute JavaScript.
Sourcery automatically identifies injection from user input in $where javascript evaluation in mongodb query and many other security issues in your codebase.