Giter Club home page Giter Club logo

vulnerable-code-snippets's Introduction

YWH Logo Vulnerable Code Snippets Vulnerable code snippet (Vsnippet) banner YesWeHack Github repo

YesWeHack present code snippets containing several different vulnerabilities to practice your code analysis. The code snippets are beginner friendly but suitable for all levels!

~ New vulnerable code snippet at Twitter @yeswehack every Friday! ๐Ÿ—’

If you want to see something special or if you just have an idea about a vulnerable code snippet, feel free to create a "New Issue" where you explain your idea, no idea is stupid.


โš ๏ธ Be aware

Be sure to run this in a secure environment, as the code is vulnerable and is intended to be used for learning code analysis!

Twitter posts ๐Ÿ”–

A Collection of all vulnerable code snippets posted on our Twitter ๐Ÿ“‚
๐Ÿ“œ#1 - SQLi & XSS | Backslash filter collide
๐Ÿ“œ#2 - Improper file access & XSS | Invalid char and regex verificaion
๐Ÿ“œ#3 - Log Forging injection, Path traversal & Code injection | Poor filter and improper include() handling
๐Ÿ“œ#4 - XSS | Invalid user input filter
๐Ÿ“œ#5 - SSRF & Broken authorization | Trusted user input and client IP from header
๐Ÿ“œ#6 - SSTI | Mixed input format
๐Ÿ“œ#7 - SQLi | Use of invalid variable within statement
๐Ÿ“œ#8 - CSRF | No CSRF token included
๐Ÿ“œ#9 - Open Redirect | Invalid regex handler
๐Ÿ“œ#10 - DOM XSS | Backend filter collide with client side JavaScript
๐Ÿ“œ#11 - CORS | Misconfigured Access-Control-Allow header
๐Ÿ“œ#12 - CSRF/ClickJacking | GET request CSRF with insecure delete process / ClickJacking - X-Frame-Options set in HTML meta tag
๐Ÿ“œ#13 - Path Traversal/Unrestricted File Upload | Poor Path Traversal and file upload protection results in a code injection
๐Ÿ“œ#14 - DOS | Incorrect operator handler in "for loop"
๐Ÿ“œ#15 - Weak Password Recovery Mechanism for Forgotten Password | Weak hash for password recovery
๐Ÿ“œ#16 - IDOR | insecure if statement leads to improper access control
๐Ÿ“œ#17 - Insecure deserialization | Execute trusted user input inside pickle function "loads()"
๐Ÿ“œ#18 - Path Traversal | Improper user validation of filename
๐Ÿ“œ#19 - Open Redirect | Invalid handling of user-controlled input "location.hash"
๐Ÿ“œ#20 - SQL injection | Invalid use of function replace(), The char is only replaced once
๐Ÿ“œ#21 - PostMessage DOM XSS | No origin validation, leading to PostMessage DOM XSS
๐Ÿ“œ#22 - XSS/OpenRedirect | The filter protection does not filter all special characters that can be used to exploit the vulnerabilities
๐Ÿ“œ#23 - Buffer overflow | Take user's STDIN input with the gets() function without checking the buffer size
๐Ÿ“œ#24 - SQL injection | Incorrect use of the PHP function "addslashes()"
๐Ÿ“œ#25 - XSS - CSP bypass | No validation of user input along with insecure handling of nonce
๐Ÿ“œ#26 - Path Traversal | The filter provided by the PHP function "preg_replace()" is limited to filtering only the first 10 characters
๐Ÿ“œ#27 - Web Cache Poisoning | The HTTP header "Referer" is reflected in the cached response body without being filtered
๐Ÿ“œ#28 - Business logic vulnerability | An attacker can withdraw negative amounts to increase the overall balance of their account
๐Ÿ“œ#29 - IDOR | An attacker can gain access to sensitive data from other users by performing a Forced browsing attack
๐Ÿ“œ#30 - Insecure deserialization | Use of a dangerous function (exec) that can be controlled by the user, resulting in an RCE
๐Ÿ“œ#31 - LFI | No proper character escaping or filter verification. The "include()" function executes all PHP code in the given file, no matter the file extension, resulting in code injection.
๐Ÿ“œ#32 - Coming...

Vulnerabilities ๐Ÿ’€

Programming Language ๐Ÿ’ป

Also included


Installation ๐Ÿ

This will create a new MySQL user and a database for the vulnerable code snippet to use.
(You should not move code snippets or any other file within repo)

git clone https://github.com/yeswehack/vulnerable-code-snippets.git

โš ๏ธ Replace '<USERNAME>' '<PASSWORD>' '<DATABASE>' and remove the #. This will be your new MySQL vulnerable snippet user, password and Database (MySQL must be installed).

Make sure your in the correct folder when running this commands.

sudo apt update;
sudo systemctl start mysql;
cd db/;
chmod +x setupVsnippet.sh;
./setupVsnippet.sh # '<USERNAME>' '<PASSWORD>' '<DATABASE>';
sudo systemctl restart mysql;

Update

Inside the vulnerable snippet folder use: (Get the newest code snippets)

git pull

~ H4v3 y0u f0und th3 E4st3r 3gg y3t? ๐Ÿ‡๐Ÿชบ

For questions, help or if you have discovered a problem with the code. Contact us on Twitter: @yeswehack ๐Ÿ“ฌ

vulnerable-code-snippets's People

Contributors

brumensywh avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.