DEV Community

Discussion on: Beware of the findOne function

 
tiguchi profile image
Thomas Werner

Good point. I turned a blind eye towards the user name since unsalted hashed passwords are also not good enough security-wise due to rainbow table attacks on leaked password hashes. As you point out passwords should be individually salted, so two hashes of the same password are not the same.

The required lookup of the user record for the password's salt hopefully also makes a NoSQL injection attack against the user name infeasible. I would assume that a proper login implementation only looks at a single result from a query, and does not loop over them until it finds a proper match.

Thread Thread
 
aksel profile image
aksel

One way is to match against email (or username or what have you), and then compare the salted hash to the password - outside of NoSQL-land.

Otherwise, what your query is really saying, is that a user could potentially have multiple accounts under the same name, with different passwords.

But yeah, the scenario the author presented the stuff with is flawed. But the point still comes across: Never trust user input. With SQL, protecting yourself from injections is pretty simple. NoSQL seems a bit more tricky

Thread Thread
 
tiguchi profile image
Thomas Werner

Yes, agreed. And JavaScript makes it a little too easy to mess user input validation up since it's so weakly typed. Maybe NoSQL is not entirely to blame here :-D

I think a JavaScript validation library could have been mentioned in the article too. I'd prefer having some proper error feedback from the server when I'm passing in wonky request payloads (by accident or on purpose).