This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASPBWA Known Vulnerabilites"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
This page is a test of how we may catalog vulnerabilities in the OWASP BWA project.
+
Known vulnerabilities in the applications contained in the OWASPBWA VM are now tracked using the "Trac" issue tracker at SourceForge: https://sourceforge.net/apps/trac/owaspbwa/report/1.
  
This page is still in testing.  It is likely that putting all these issues on one page will be too large and we'll need to break it into a separate page per application.
+
Please review and contribute issues.  Thanks.
 
 
= Struts Forms  =
 
 
 
{| cellspacing="1" cellpadding="1" border="1"
 
|-
 
| ID<br>
 
| Type<br>
 
| URL<br>
 
| Details<br>
 
|-
 
| 1<br>
 
| Reflected XSS<br>
 
| http://owaspbwa:8080/mandiant-struts-form-vulnerable/submitname.do<br>
 
| Visit http://owaspbwa:8080/mandiant-struts-form-vulnerable/submitname.do?name=%3Cscript%3Ealert%281%29%3C/script%3E&amp;submit=Submit to demonstrate this issue.
 
|-
 
| 2<br>
 
| <br>
 
| <br>
 
| <br>
 
|}
 
 
 
<br>
 
 
 
= Simple ASP.NET Forms  =
 
 
 
= OWASP&nbsp;VicNum<br>  =
 
 
 
{| cellspacing="1" cellpadding="1" border="1"
 
|-
 
| ID<br>
 
| Type<br>
 
| URL<br>
 
| Details<br>
 
|-
 
| 1<br>
 
| Reflected XSS<br>
 
| http://owaspbwa/vicnum/cgi-bin/vicnum1.pl<br>
 
| Visit http://owaspbwa/vicnum/cgi-bin/vicnum1.pl?player=Foo%3Cscript%3Ealert%281%29%3C%2Fscript%3E to demonstrate this issue.
 
|-
 
| 2<br>
 
| Reflected XSS<br>
 
| http://owaspbwa/vicnum/vicnum5.php<br>
 
| To illustrate this issue, send a POST request
 
<br>POST http://owaspbwa/vicnum/vicnum5.php
 
 
 
player=&lt;script&gt;alert(1)&lt;/script&gt;<br>
 
 
 
|-
 
| 3<br>
 
| State Manipulation<br>
 
| <br>
 
| When playing the game, the "correct" answer is stored in Base64 encoded form in a hidden form field named VIEWSTATE. An attacker can decode this value in order to determine the correct answer to the game or manipulate it.<br>
 
|}
 
 
 
= WordPress version 2.0.0  =
 
 
 
= phpBB version 2.0.0 =
 
 
 
= Yazd version 1.0  =
 
 
 
[[Category:OWASPBWA]]
 

Revision as of 07:34, 10 November 2010

Known vulnerabilities in the applications contained in the OWASPBWA VM are now tracked using the "Trac" issue tracker at SourceForge: https://sourceforge.net/apps/trac/owaspbwa/report/1.

Please review and contribute issues. Thanks.