|
|
Line 1: |
Line 1: |
− | This page is a test of how we may catalog vulnerabilities in the OWASP BWA project.
| + | Known vulnerabilities in the applications contained in the OWASPBWA VM are now tracked using the "Trac" issue tracker at SourceForge: https://sourceforge.net/apps/trac/owaspbwa/report/1. |
| | | |
− | This page is still in testing. It is likely that putting all these issues on one page will be too large and we'll need to break it into a separate page per application.
| + | Please review and contribute issues. Thanks. |
− | | |
− | = Struts Forms =
| |
− | | |
− | {| cellspacing="1" cellpadding="1" border="1"
| |
− | |-
| |
− | | ID<br>
| |
− | | Type<br>
| |
− | | URL<br>
| |
− | | Details<br>
| |
− | |-
| |
− | | 1<br>
| |
− | | Reflected XSS<br>
| |
− | | http://owaspbwa:8080/mandiant-struts-form-vulnerable/submitname.do<br>
| |
− | | Visit http://owaspbwa:8080/mandiant-struts-form-vulnerable/submitname.do?name=%3Cscript%3Ealert%281%29%3C/script%3E&submit=Submit to demonstrate this issue.
| |
− | |-
| |
− | | 2<br>
| |
− | | <br>
| |
− | | <br>
| |
− | | <br>
| |
− | |}
| |
− | | |
− | <br>
| |
− | | |
− | = Simple ASP.NET Forms =
| |
− | | |
− | = OWASP VicNum<br> =
| |
− | | |
− | {| cellspacing="1" cellpadding="1" border="1"
| |
− | |-
| |
− | | ID<br>
| |
− | | Type<br>
| |
− | | URL<br>
| |
− | | Details<br>
| |
− | |-
| |
− | | 1<br>
| |
− | | Reflected XSS<br>
| |
− | | http://owaspbwa/vicnum/cgi-bin/vicnum1.pl<br>
| |
− | | Visit http://owaspbwa/vicnum/cgi-bin/vicnum1.pl?player=Foo%3Cscript%3Ealert%281%29%3C%2Fscript%3E to demonstrate this issue.
| |
− | |-
| |
− | | 2<br>
| |
− | | Reflected XSS<br>
| |
− | | http://owaspbwa/vicnum/vicnum5.php<br>
| |
− | | To illustrate this issue, send a POST request
| |
− | <br>POST http://owaspbwa/vicnum/vicnum5.php
| |
− | | |
− | player=<script>alert(1)</script><br>
| |
− | | |
− | |-
| |
− | | 3<br>
| |
− | | State Manipulation<br>
| |
− | | <br>
| |
− | | When playing the game, the "correct" answer is stored in Base64 encoded form in a hidden form field named VIEWSTATE. An attacker can decode this value in order to determine the correct answer to the game or manipulate it.<br>
| |
− | |}
| |
− | | |
− | = WordPress version 2.0.0 =
| |
− | | |
− | = phpBB version 2.0.0 =
| |
− | | |
− | = Yazd version 1.0 =
| |
− | | |
− | [[Category:OWASPBWA]]
| |
Revision as of 07:34, 10 November 2010
Known vulnerabilities in the applications contained in the OWASPBWA VM are now tracked using the "Trac" issue tracker at SourceForge: https://sourceforge.net/apps/trac/owaspbwa/report/1.
Please review and contribute issues. Thanks.