Vulnerable ASP.net core application
- SQL Injection
- XPATH Injection
- Credential Stuffing
- Leaking Credit Card Information
- Accessing local resource
- Elevate access privileges
- Show SQL Exception in response
- Reflected XSS
- Insecure XML deserialization
- Using component vulnerable to XSS
- Insufficient logging after data breach
You can execute the following commands in order to run the application:
dotnet build vulnerable_asp_net_core.sln
dotnet run --project vulnerable_asp_net_core
After running the application, you should see the following output:
...
Now listening on: https://localhost:5001
Now listening on: http://localhost:5000
Application started. Press Ctrl+C to shut down.
Application is shutting down...
In order to run all exploits you can execute the run_all.sh
script in the
exploits/
directory with:
./run_all.sh
The command above should produce the following output:
execute ./sqlinjection.sh ... OK
execute ./xss.sh ... OK
execute ./vulnerable_component.sh ... OK
execute ./broken_authentication.sh ... OK
execute ./insecure_deserialization.sh ... OK
execute ./security_misconfiguration.sh ... OK
execute ./xxe.sh ... OK
execute ./common.sh ... OK
execute ./xpathinjection.sh ... OK
execute ./broken_access_control.sh ... OK
execute ./insufficient-logging.sh ... OK
execute ./sensitive_data_exposure.sh ... OK