Skip to content

sinbill/VulnerableLightApp

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

88 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Dojo-101

License: GNU GPL v3 GitHub last commit .NET

⚠️ Disclaimer : This repository, together with its tools, is provided by Taisen-Solutions on an "as is" basis. Be aware that this application is highly vulnerable, including remote command and code execution. Use it at your own risk. Taisen-Solutions makes no representations or warranties of any kind, express or implied, as to the operation of the information, content, materials, tools, services and/or products included on the repository. Taisen-Solution disclaims, to the full extent permissible by applicable law, all warranties, express or implied, including but not limited to, implied warranties of merchantability and fitness for a particular purpose.

🎱 Use Case

UseCase

🐞 Vulnerabilities

CWE Description Difficulty Estimated Bug Bounty Reward
CWE-22 Path Traversal Medium 500-5.000$
CWE-78 OS Command Injection Easy 1.000-10.000$
CWE-79 Cross-site Scripting Easy 500-5.000$
CWE-89 SQL Injection Easy 1.000-10.000$
CWE-94 Code Injection Hard 5.000-50.000$
CWE-91 XML Injection Hard 0-500$
CWE-98 Remote File Inclusion Hard 1.000-10.000$
CWE-184 Incomplete List of Disallowed Inputs Medium 500-2.000$
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor Medium 1.000-20.000$
CWE-213 Exposure of Sensitive Information Due to Incompatible Policies Easy 500-2.000$
CWE-284 Improper Access Control Medium 1.000-5.000$
CWE-287 Improper Authentication Medium 500-5.000$
CWE-319 Cleartext Transmission of Sensitive Information Very Easy 500-2.000$
CWE-326 Inadequate Encryption Strength Easy 1.000-5.000$
CWE-434 Unrestricted Upload of File with Dangerous Type Medium 500-10.000$
CWE-502 Deserialization of Untrusted Data Hard 5.000-50.000$
CWE-521 Weak Password Requirements Very Easy 500-2.000$
CWE-532 Insertion of Sensitive Information into Log File Very Easy 100-2.000$
CWE 639 Insecure Direct Object Reference Medium 500-5.000$
CWE-611 Improper Restriction of XML External Entity Reference Hard 1.000-10.000$
CWE-787 Out-of-bounds Write Easy 500-5000$
CWE-798 Use of Hard-coded Credentials Very Easy 1.000-10.000$
CWE-829 Local File Inclusion Easy 500-2.000$
CWE-912 Backdoor Hard 10.000$-100.000$
CWE-918 Server-Side Request Forgery (SSRF) Medium 1.000$-10.000$
CWE-1270 Generation of Incorrect Security Tokens Medium 1.000-20.000$

🏭 Context

VLA is designed as a vulnerable backend application, running in the following environment :

Context

🔑 Hint, Solution & Write Up

  • Before searching Write-Up, try reading Dojo-101
  • Become a project sponsor and gain access to all the solutions.
  • Or just buy me a coffee and get an unique Nuclei template (not for my students)

✅ Prerequisites

Check .csproj file to get the current dotnet version and install .NET SDK

⬇️ Download

git clone https://github.com/Aif4thah/VulnerableLightApp.git
cd .\VulnerableLightApp\

🔧 Build

dotnet build

🎮 Usage

.\bin\Debug\net8.0\VulnerableWebApplication.exe [--url=<url>]

Alternatively, you can run directly with

dotnet run

🛠️ Debug

Dotnet Framework

Verify you use the intended .NET Framework

where dotnet
dotnet --version
dotnet --list-sdks

Certificates

To trust the certificate

dotnet dev-certs https --trust

Dependancies

dependancies have to be dowloaded from standard sources

dotnet nuget add source "https://api.nuget.org/v3/index.json" --name "Microsoft"

Misc

  • Be aware that VLA runs Linux and MacOS, but is only tested and supported on Windows.

💜 Crédits

  • Special thanks to all the hackers and students who pushed me to improve this work
  • Project maintened by Michael Vacarella

About

Vulnerable API for educational purposes

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C# 100.0%