2017 © Pedro Peláez
 

project insecurity

Web application that consists of a plethora of security vulnerabilities held together by some functionality

image

oliverklee/insecurity

Web application that consists of a plethora of security vulnerabilities held together by some functionality

  • Saturday, January 27, 2018
  • by oliverklee
  • Repository
  • 1 Watchers
  • 0 Stars
  • 0 Installations
  • PHP
  • 0 Dependents
  • 0 Suggesters
  • 3 Forks
  • 21 Open issues
  • 4 Versions
  • 0 % Grown

The README.md

Insecurity

Build Status Latest Stable Version Total Downloads Latest Unstable Version License, (*1)

What is this all about?

This project is a web application that consists of a plethora of security vulnerabilities held together by some functionality., (*2)

This project has been created as an educational resource for workshops on PHP web security. You could use in several ways:, (*3)

  • show the attendees the vulnerabilities and how to fix them
  • have the attendees search for vulnerabilities
  • have the attendees fix the vulnerabilities

Warning

Never, ever put this project on any web server that is accessible from the internet. Your server will get hacked., (*4)

How to use this project for learning

For learning as much as possible (e.g., at a workshop on web application security), I propose you do the exercises in the following order:, (*5)

  1. Install the application and try to find as many vulnerabilities as possible without reading the code and without using any automatic vulnerability scanning tools. Just use the application front end (without logging in, then with the user login and with the admin login). Use browser plugins that help you manipulate the requests and read the web site source., (*6)

  2. Try to find more vulnerabilities by reading the code., (*7)

  3. Try to find more vulnerabilities by using automated vulnerability scanners., (*8)

  4. Compare the list of vulnerabilities you have found in the previous two steps with the list available in the solutions branch., (*9)

  5. Fix the vulnerabilities., (*10)

Installation

  1. Install Vagrant and run vagrant up .
  2. vagrant ssh
  3. cd /var/www/
  4. composer install
  5. Log out from the virtual box.
  6. You now can access your insecure site at http://192.168.33.10/.
  7. You can log in as either admin@example.com / 12345678 or as user@example.com / asdfqwer .

Resetting the database

The database and its contents are automatically created when you run vagrant up., (*11)

If you ever need to rebuild the database from scratch, follow this list of steps:, (*12)

  1. vagrant ssh
  2. sh /var/www/db/setup-database.sh
  3. Log out from the virtual box.

List of vulnerabilities

There is a list of vulnerabilities in the file Vulnerabilities.md in the branch solutions (to keep you from seeing the solutions by accident before you have had the chance to find the vulnerabilities yourself)., (*13)

About me (Oliver Klee)

I am a former member of the TYPO3 Security Team and the maintainer of the PHPUnit TYPO3 extension, which is available in the TYPO3 extension repository (TER)., (*14)

You can book me for workshops at your company., (*15)

I also frequently give workshops at the TYPO3 Developer Days., (*16)

Contributing

Contributions in the form of bug fixes, more vulnerabilities or clean-up in the form of pull requests is always more than welcome., (*17)

Please do not report any security vulnerabilities, and please do not submit pull requests with security fixes - you're missing the point., (*18)

License

The application is licensed under the Gnu Public License (GPL) V3., (*19)

The included Twitter Bootstrap and jQuery are licensed under the MIT License (MIT)., (*20)

The Versions

27/01 2018

dev-master

9999999-dev https://www.oliverklee.de/workshops/workshops.html

Web application that consists of a plethora of security vulnerabilities held together by some functionality

  Sources   Download

GPL-3.0-or-later

The Requires

  • php ~7.0.0 || ~7.1.0 || ~7.2.0

 

The Development Requires

security example exercise

27/01 2018

dev-cleanup/scripts

dev-cleanup/scripts https://www.oliverklee.de/workshops/workshops.html

Web application that consists of a plethora of security vulnerabilities held together by some functionality

  Sources   Download

GPL-3.0-or-later

The Requires

  • php ~7.0.0 || ~7.1.0 || ~7.2.0

 

The Development Requires

security example exercise

25/01 2018

dev-feature/php-lint

dev-feature/php-lint https://www.oliverklee.de/workshops/workshops.html

Web application that consists of a plethora of security vulnerabilities held together by some functionality

  Sources   Download

GPL-3.0-or-later

The Requires

  • php ~7.0.0 || ~7.1.0 || ~7.2.0

 

The Development Requires

security example exercise

01/01 2016

dev-solutions

dev-solutions

  Sources   Download

The Requires

  • php >=5.5.0

 

The Development Requires