TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Damn Vulnerable Node Application

43 点作者 anaxag0ras超过 9 年前

6 条评论

nailer超过 9 年前
Seems to be a bunch of Express apps rather than a single application. Many just take arbitrary input from requests and do things on the shell. I&#x27;d hope (maybe I&#x27;m wrong) that most people are already aware that executing arbitrary user input is bad. See <a href="https:&#x2F;&#x2F;github.com&#x2F;quantumfoam&#x2F;DVNA&#x2F;tree&#x2F;master&#x2F;vulnerabilities" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;quantumfoam&#x2F;DVNA&#x2F;tree&#x2F;master&#x2F;vulnerabilit...</a>
sebcat超过 9 年前
I was kinda hoping for node specific vulns. This does not seem to cover more than DVWA, WAVSEP or any other test suites&#x2F;intentionally vulnerable web applications out there.
评论 #10791400 未加载
javajosh超过 9 年前
Well, skimming the vulnerabilities [1] didn&#x27;t really see anything too interesting. Consider this &quot;eval_remote&quot; vulnerability:<p><pre><code> var e = require(&quot;express&quot;); var DVNA = e(); DVNA.get(&#x27;&#x2F;&#x27;, function(req, res) { var res = eval(&quot;(&quot;+req.query.e+&quot;)&quot;); res.send(&#x27;Parameter eval():&lt;br&gt; &#x27; + res); }); DVNA.listen(6666); </code></pre> Yes, if you eval your requests that is a vulnerability, but it is a trivial one. I was expecting some side-channel esoteric stuff that, reading the code, you wouldn&#x27;t necessarily see the problem.<p>1 - <a href="https:&#x2F;&#x2F;github.com&#x2F;quantumfoam&#x2F;DVNA&#x2F;tree&#x2F;master&#x2F;vulnerabilities" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;quantumfoam&#x2F;DVNA&#x2F;tree&#x2F;master&#x2F;vulnerabilit...</a>
iDemonix超过 9 年前
Reminds me of Damn Vulnerable Web App (<a href="http:&#x2F;&#x2F;www.dvwa.co.uk&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.dvwa.co.uk&#x2F;</a>) which my friend made whilst we were at university.
sebcat超过 9 年前
the OWASP Broken Web Applications project (owaspbwa) is worth mentioning in this context. It&#x27;s a collection of vulnerable web applications for web security training, demonstrations and testing. It can be downloaded as a VM from [1]. I don&#x27;t have a lot of faith in sourceforge, but it seems to be the official source.<p>[1]: <a href="http:&#x2F;&#x2F;sourceforge.net&#x2F;projects&#x2F;owaspbwa&#x2F;files&#x2F;1.2&#x2F;" rel="nofollow">http:&#x2F;&#x2F;sourceforge.net&#x2F;projects&#x2F;owaspbwa&#x2F;files&#x2F;1.2&#x2F;</a>
gonyea超过 9 年前
It&#x27;s beta, so don&#x27;t put this in production (yet)!