Code Monkey home page Code Monkey logo

dvws's Introduction

Damn Vulnerable Web Services

NOTE: This project is out of date, please use https://github.com/snoopysecurity/dvws-node

Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn real world web service vulnerabilities. The aim of this project is to help security professionals learn about Web Application Security through the use of a practical lab environment.

DVWS

This application includes the following vulnerabilities.

  • WSDL Enumeration
  • XML External Entity Injection
  • XML Bomb Denial-of-Service
  • XPATH Injection
  • WSDL Scanning
  • Cross Site-Tracing
  • OS Command Injection
  • Server Side Request Forgery
  • REST API SQL Injection
  • Same Origin Method Execution
  • JSON Web Token (JWT) Secret Key Brute Force
  • Cross-Origin Resource Sharing

Instructions

DVWS can be used with a XAMPP setup. XAMPP is a free and open source cross-platform web server solution which mainly consists of an Apache Web Server and MySQL database. To setup, download and install the XAMPP setup first. Next, download the dvws folder and copy the folder to your htdocs directory. Lastly, Setup or reset the database by going to http://localhost/dvws/instructions.php

Note: PHP 5.5.38 is required for most of the exercises to work correctly.

Disclaimer

Do not host this application on live or production environment.

Copyright

This work is licensed under GNU GENERAL PUBLIC LICENSE Version 3 To view a copy of this license, visit http://www.gnu.org/licenses/gpl-3.0.txt

To Do list

  • JSON Hijacking
  • SOAP Injection
  • XML Injection

dvws's People

Contributors

snoopysecurity avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

dvws's Issues

$id not defined

This might be deliberate but $id is not defined in dvws/vulnerabilities/wsdlenum/functions.php if a username is passed that isn't in the $details array.

This is what gets returned:

<br />
<b>Notice</b>:  Undefined variable: id in <b>/var/sites/dvws/secure/htdocs/dvws/vulnerabilities/wsdlenum/functions.php</b> on line <b>36</b><br />
<?xml version="1.0" encoding="ISO-8859-1"?><SOAP-ENV:Envelope SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/" xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/"><SOAP-ENV:Body><ns1:check_user_idResponse xmlns:ns1="http://schemas.xmlsoap.org/soap/envelope/"><return xsi:nil="true" xsi:type="xsd:string"/></ns1:check_user_idResponse></SOAP-ENV:Body></SOAP-ENV:Envelope>  

XXE Vulnerability

Hi,

As mentioned by you, there are not many practical environments available for hacking web services, I am glad you created dvws.

I am trying to exploit XXE, and tried different payloads. Its not working. below is request and payloads which i tried.

POST /dvws/vulnerabilities/xxe/ HTTP/1.1
Host: 192.168.2.2
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.2.2/dvws/vulnerabilities/xxe/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 84

]>

name=&xxe;

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

and i tried to include just entity, even this does not works.

]>

name=&xxe;

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

I tried xml tag too, no luck.

]>

name=&xxe;

REST API SQL Injection is broken

REST API SQL Injection is broken.
When "/dvws/vulnerabilities/sqli/api.php/users/2" is called it returns "Fatal error: Uncaught Error: Call to undefined function mysql_connect()"

Integration of OpenAPI specification or document for vulnerable endpoints.

Thanks for this very useful tool. I will like to recommend integration of a feature.
Since there is already a WADL component, how about defining a document that contains the vulnerable endpoints in DVWS ? A possible standard could be using the Open API (formerly Swagger). The OpenAPI is getting popular and its inclusion could be a very useful functionality for REST security testing. Cheers !

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.