Skip to content

newlight77/JavaVulnerableLab

 
 

Repository files navigation

Java Vulnerabilities Lab

This is a vulnerable Web Application developed by Cyber Security and Privacy Foundation. This app is intended for the Java Developers and other people who wish to learn about Web Application vulnerabilities or simply write secure code because they are concerned about security - and everyone should!.

Prerequisites:

Deploy it

There are many easy way to deploy this application.

  1. Using Vagrant to run this application in a VM (containers are launched inside it, as describe in option #2) :
git clone https://github.com/softwaresecured/JavaVulnerableLab.git
cd JavaVulnerableLab
vagrant up
  1. Using Docker to run on a machine :
git clone https://github.com/softwaresecured/JavaVulnerableLab.git
cd JavaVulnerableLab
docker-compose up -d javavulnlab mysql
  1. If not using Docker at all, you'll need to the JDBC URL in config.properties and install.jsp from :
dburl=jdbc:mysql://mysql:3306/  => jdbc:mysql://localhost:3306 
  1. If you want to play with it on a VPS, you'll need to the JDBC URL in config.properties and install.jsp from :
dburl=jdbc:mysql://mysql:3306/  => jdbc:mysql://SERVER_HOSTNAME_OR_IP_ADDRESS:3306 

And the link at next step will require the server hostname or IP address.

  1. You already have a tomcat, and want to deploy the application with a war.

Steps:

   1. Go to http://[Tomcat_INSTALLED_IP]:8080/manager/  (make sure you have modified tomcat-users.xml file of the tomcat to allow the manager).
   2. Download our WAR file from here: https://sourceforge.net/projects/javavulnerablelab/files/latest/JavaVulnerableLab.war/download
   3. Deploy the WAR in Apache Tomcat manager.

Experiment it

  1. Once the build is completed and the application is started, go to /JavaVulnerableLab/install.jsp

  2. And click on Install button, by leaving default values as-is.

Vulnerabilities Scan

The Open Web Application Security Project (OWASP) team recommends many tools to address security matters, allowing to scan the vulnerabilities of Web Applications. One of the most popular is OWASP Zed Attack Proxy (ZAP). Please refer to this guideline for more details. Also, if you need to automate everything in your Continuous Integration and Continuous Delivery (CI/CD) toolchain, you can go through this guideline.

Notes

The full course on Hacking and Securing Web Java Programs is available in

https://www.udemy.com/hacking-securing-java-web-programming/

Warning: It's not recommended to run this app in Your Main Machine or in an online server. Prefer using Docker or a VM (vagrant).

You can also get the VulnerableSpring Project from here.

About

Vulnerable Java based Web Application

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Java 92.4%
  • CSS 4.3%
  • XSLT 2.0%
  • Other 1.3%