TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Damn Vulnerable Node Application

43 pointsby anaxag0rasover 9 years ago

6 comments

nailerover 9 years ago
Seems to be a bunch of Express apps rather than a single application. Many just take arbitrary input from requests and do things on the shell. I&#x27;d hope (maybe I&#x27;m wrong) that most people are already aware that executing arbitrary user input is bad. See <a href="https:&#x2F;&#x2F;github.com&#x2F;quantumfoam&#x2F;DVNA&#x2F;tree&#x2F;master&#x2F;vulnerabilities" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;quantumfoam&#x2F;DVNA&#x2F;tree&#x2F;master&#x2F;vulnerabilit...</a>
sebcatover 9 years ago
I was kinda hoping for node specific vulns. This does not seem to cover more than DVWA, WAVSEP or any other test suites&#x2F;intentionally vulnerable web applications out there.
评论 #10791400 未加载
javajoshover 9 years ago
Well, skimming the vulnerabilities [1] didn&#x27;t really see anything too interesting. Consider this &quot;eval_remote&quot; vulnerability:<p><pre><code> var e = require(&quot;express&quot;); var DVNA = e(); DVNA.get(&#x27;&#x2F;&#x27;, function(req, res) { var res = eval(&quot;(&quot;+req.query.e+&quot;)&quot;); res.send(&#x27;Parameter eval():&lt;br&gt; &#x27; + res); }); DVNA.listen(6666); </code></pre> Yes, if you eval your requests that is a vulnerability, but it is a trivial one. I was expecting some side-channel esoteric stuff that, reading the code, you wouldn&#x27;t necessarily see the problem.<p>1 - <a href="https:&#x2F;&#x2F;github.com&#x2F;quantumfoam&#x2F;DVNA&#x2F;tree&#x2F;master&#x2F;vulnerabilities" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;quantumfoam&#x2F;DVNA&#x2F;tree&#x2F;master&#x2F;vulnerabilit...</a>
iDemonixover 9 years ago
Reminds me of Damn Vulnerable Web App (<a href="http:&#x2F;&#x2F;www.dvwa.co.uk&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.dvwa.co.uk&#x2F;</a>) which my friend made whilst we were at university.
sebcatover 9 years ago
the OWASP Broken Web Applications project (owaspbwa) is worth mentioning in this context. It&#x27;s a collection of vulnerable web applications for web security training, demonstrations and testing. It can be downloaded as a VM from [1]. I don&#x27;t have a lot of faith in sourceforge, but it seems to be the official source.<p>[1]: <a href="http:&#x2F;&#x2F;sourceforge.net&#x2F;projects&#x2F;owaspbwa&#x2F;files&#x2F;1.2&#x2F;" rel="nofollow">http:&#x2F;&#x2F;sourceforge.net&#x2F;projects&#x2F;owaspbwa&#x2F;files&#x2F;1.2&#x2F;</a>
gonyeaover 9 years ago
It&#x27;s beta, so don&#x27;t put this in production (yet)!