Giter VIP home page Giter VIP logo

yrpreyblog's Introduction

YpreyBlog

yprey

Created by Fernando Mengali

YpreyBlog is a framework based on library systems for borrowing and returning books for students and users. The framework perfectly simulates a library system but has vulnerabilities based on the OWASP TOP 10 WebApp 2021. The framework was developed for teaching and learning details in Pentest (penetration testing) and Application Security. In the context of Offensive Security, vulnerabilities contained in web applicaton can be identified, exploited and compromised. For application security professionals and specifics, the framework provides an in-depth understanding of code-level vulnerabilities. Yrprey, making it valuable for educational, learning and teaching purposes in the Information Security area. For more information about the vulnerabilities, we recommend exploring the details available at yrprey.com.

Features

  • Based on OWASP's top 10 vulnerabilities for Web Application.

Initially, an unregistered user has access to minimal information about the blog. Upon registering, the user can log in, thereby obtaining a session token that will be used to validate permissions for posting, commenting, etc. The features include posting on the blog, commenting on posts, removing posts, etc. The structure was built based on vulnerabilities and is not recommended for personal or business use, only for laboratory use and learning about exploitation and vulnerability fixing.

List of Vulnerabilities

In this section, we have a comparison of the vulnerabilities present in the framework with the routes and a comparison between the OWASP TOP 10 Web Application. This table makes it easier to understand how to exploit vulnerabilities in each systemic function. In the last two columns we have a parenthesis and the scenario associated with the OWASP TOP 10 Web Applications, facilitating the understanding of the theory described on the page https://owasp.org/www-project-top-ten/. After understanding the scenario and the vulnerable route, the process of identifying and exploiting vulnerabilities becomes easier. If you are an Application Security professional, knowing the scenario and routes of endpoints makes the process of identifying and correcting vulnerabilities easier with manual Code Review Security techniques or automated SAST, SCA and DAST analyses

Complete table with points vulnerables, vulnerability details and a comparison between OWASP TOP 10 Web Application vulnerabilities:

OWASP TOP 10 Method Path Details
A03:2021-Injection GET /index.php SQL Injection - Authentication
A03:2021-Injection GET /search.php SQL Injection
A03:2021-Injection GET /search.php Cross-Site Scripting - Reflect
A03:2021-Injection GET /logout.php?url=http://... Redirect to other url
A03:2021-Injection GET /createPost.php Cross-Site Scripting - Stored
A01:2021-Injection POST /createPost.php Cross-Site Request Forgery - Referer
A01:2021-Injection POST /post.php Cross-Site Scripting - Reflect
A01:2021-Injection POST /managePost.php Cross-Site Request Forgery - Remove Post
A01:2021-Broken Access Control POST /createPost.php Upload file to generate shell reverse
A01:2021-Broken Access Control POST /index.php E-mail enumeration
A05:2021-Security Misconfiguration GET /ftp/WS_FTP.LOG Misconfiguration
A05:2021-Security Misconfiguration GET /phpinfo.php Misconfiguration
A05:2021-Security Misconfiguration GET /ssh-key.priv Misconfiguration
A06:2021-Vulnerable and Outdated Components GET /js/jquery-1.5.1.js XSS to function: html,append,load,after..
A06:2021-Vulnerable and Outdated Components GET /js/jquery-1.5.1.js Prototype Pollution to function: extend
A06:2021-Vulnerable and Outdated Components GET /js/lodash-3.9.0.js Prototype Pollution to function: zipObjectDeep..
A06:2021-Vulnerable and Outdated Components GET /js/lodash-3.9.0.js Code Injection across template
A06:2021-Vulnerable and Outdated Components GET /js/lodash-3.9.0.js ReDoS to functions: toNumber, trim, trimEnd
A06:2021-Vulnerable and Outdated Components GET /js/bootstrap-4.1.3.js Prototype Pollution to function: data-template...
A07:2021-Identif. and Authentication Failures N/A Change cache cookie to admin Session Hijacking (Manipulation Cookie)

How Install

  • 1º - Install and configure Apache, PHP and MySQL on your Linux
  • 2º - Import the YRpreyPHP files to /var/www/
  • 3º - Create a database named "yrprey"
  • 4º - Import the yrprey.sql into the database.
  • 5º - Access the address http://localhost in your browser
  • 6º - Give chmod 777 or write permission to the uploads directory.

Observation

You can test on Xampp or any other platform that supports PHP and MySQL.

Reporting Vulnerabilities

Please, avoid taking this action and requesting a CVE!

The application intentionally has some vulnerabilities, most of them are known and are treated as lessons learned. Others, in turn, are more "hidden" and can be discovered on your own. If you have a genuine desire to demonstrate your skills in finding these extra elements, we suggest you share your experience on a blog or create a video. There are certainly people interested in learning about these nuances and how you identified them. By sending us the link, we may even consider including it in our references.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.