OWASP / OWASP-VWAD

The OWASP Vulnerable Web Applications Directory project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
https://owasp.org/www-project-vulnerable-web-applications-directory/
Apache License 2.0
858 stars 219 forks source link

Damn Vulnerable Application Scanner (DVAS) #198

Closed gabriele-costa closed 10 months ago

gabriele-costa commented 10 months ago

DVAS contains a collection of web-based (vulnerable) security scanners, including (but not limited to) the vulnerabilities from "Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners". DVAS also contains a simulation of CVE-2020-7354 and CVE-2020-7355 for Metasploit Pro.

github-actions[bot] commented 10 months ago

The following issues were identified:

Summary ``` src/data/collection.json invalid data/20/references/0/name must be equal to one of the allowed values ```
kingthorin commented 10 months ago

I’m confused is this a target for learning or a tool to scan things?

If the later this is not the place to add it.

gabriele-costa commented 10 months ago

Yes, that is quite an unusual perspective :). DVAS is an intentionally vulnerable web scanner that is meant to demonstrate and teach about "responsive" attacks. Basically, when someone makes a scan, she/he might become the target of a counterattack if a vulnerable scanner is used. Understanding this attack scenario is subtle and DVAS comes with an attack tool (called revok) that one can use to see the attack in action. However, the attack should be done manually when the goal is education/awareness.

psiinon commented 10 months ago

@gabriele-costa nice research! OK for us (ZAP team) to reference it? If so is that the best URL for us to use?

psiinon commented 10 months ago

And any more feedback on your ZAP testing would be appreciated, e.g. details of the 4 tained flows..

gabriele-costa commented 10 months ago

@psiinon Thank you! Yes, we would be very glad about that. Here are more details about the attacker model and vulnerabilities we found.

Let me know if I can provide further details

gabriele-costa commented 10 months ago

And any more feedback on your ZAP testing would be appreciated, e.g. details of the 4 tained flows..

I'm checking this out

gabriele-costa commented 10 months ago

And any more feedback on your ZAP testing would be appreciated, e.g. details of the 4 tained flows..

Here we are. We found 4 tainted flows (but no actual vulnerability) with destination in the HTML report exported by ZAP. In particular, the following HTTP response headers were included: X-Powered-By, Location, X-Content-Type, and X-AspNet-Version. These results refer to tests that were carried out in 2020, thus they might be different now. Also, if I'm not wrong, the reporting system of ZAP might have changed in the meantime. However, since HTML reports can still be exported, RevOK could be used to repeat the experiments. If you are interested, we can provide help and support on this.

psiinon commented 10 months ago

Thanks. Any of the authors have twitter accounts I can mention?

gabriele-costa commented 10 months ago

Thanks. Any of the authors have twitter accounts I can mention?

Andrea has one https://twitter.com/avalz_

psiinon commented 10 months ago

FYI :) https://twitter.com/psiinon/status/1720082608019952083