Difference between revisions of "OWASPBWA Known Vulnerabilites"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
This page is a test of how we may catalog vulnerabilities in the OWASP BWA project.
+
Known vulnerabilities in the applications contained in the OWASPBWA VM are now tracked using the "Trac" issue tracker at SourceForge: https://sourceforge.net/apps/trac/owaspbwa/report/1.
  
This page is still in testing.  It is likely that putting all these issues on one page will be too large and we'll need to break it into a separate page per application.
+
Please review and contribute issues.  Thanks.
 
+
= Struts Forms =
+
 
+
{| cellspacing="1" cellpadding="1" border="1"
+
|-
+
| ID<br>
+
| Type<br>
+
| URL<br>
+
| Details<br>
+
|-
+
| 1<br>
+
| Reflected XSS<br>
+
| http://owaspbwa:8080/mandiant-struts-form-vulnerable/submitname.do<br>
+
| Visit http://owaspbwa:8080/mandiant-struts-form-vulnerable/submitname.do?name=%3Cscript%3Ealert%281%29%3C/script%3E&amp;submit=Submit to demonstrate this issue.
+
|-
+
| 2<br>
+
| <br>
+
| <br>
+
| <br>
+
|}
+
 
+
<br>
+
 
+
= Simple ASP.NET Forms  =
+
 
+
= OWASP&nbsp;VicNum<br>  =
+
 
+
{| cellspacing="1" cellpadding="1" border="1"
+
|-
+
| ID<br>
+
| Type<br>
+
| URL<br>
+
| Details<br>
+
|-
+
| 1<br>
+
| Reflected XSS<br>
+
| http://owaspbwa/vicnum/cgi-bin/vicnum1.pl<br>
+
| Visit http://owaspbwa/vicnum/cgi-bin/vicnum1.pl?player=Foo%3Cscript%3Ealert%281%29%3C%2Fscript%3E to demonstrate this issue.
+
|-
+
| 2<br>
+
| Reflected XSS<br>
+
| http://owaspbwa/vicnum/vicnum5.php<br>
+
| To illustrate this issue, send a POST request
+
<br>POST http://owaspbwa/vicnum/vicnum5.php
+
 
+
player=&lt;script&gt;alert(1)&lt;/script&gt;<br>
+
 
+
|-
+
| 3<br>
+
| State Manipulation<br>
+
| <br>
+
| When playing the game, the "correct" answer is stored in Base64 encoded form in a hidden form field named VIEWSTATE. An attacker can decode this value in order to determine the correct answer to the game or manipulate it.<br>
+
|}
+
 
+
= WordPress version 2.0.0  =
+
 
+
= phpBB version 2.0.0  =
+
 
+
= Yazd version 1.0  =
+
 
+
[[Category:OWASPBWA]]
+

Revision as of 02:34, 10 November 2010

Known vulnerabilities in the applications contained in the OWASPBWA VM are now tracked using the "Trac" issue tracker at SourceForge: https://sourceforge.net/apps/trac/owaspbwa/report/1.

Please review and contribute issues. Thanks.