{"id":13540241,"url":"https://github.com/cr0hn/vulnerable-node","last_synced_at":"2025-05-16T06:07:57.394Z","repository":{"id":38983964,"uuid":"60779097","full_name":"cr0hn/vulnerable-node","owner":"cr0hn","description":"A very vulnerable web site written in NodeJS with the purpose of have a project with identified vulnerabilities to test the quality of security analyzers tools tools","archived":false,"fork":false,"pushed_at":"2024-08-20T15:34:11.000Z","size":1259,"stargazers_count":464,"open_issues_count":11,"forks_count":694,"subscribers_count":16,"default_branch":"master","last_synced_at":"2025-04-08T16:05:22.330Z","etag":null,"topics":["analyzer","common-vulnerabilities","identified-vulnerabilities","nodejs","security-analyzers","vulnerability","whitebox"],"latest_commit_sha":null,"homepage":"","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/cr0hn.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"github":["cr0hn"]}},"created_at":"2016-06-09T14:00:23.000Z","updated_at":"2025-04-05T02:02:32.000Z","dependencies_parsed_at":"2024-01-15T20:47:22.096Z","dependency_job_id":"5c9471db-a0d4-40b2-ab53-7f73713bcbd4","html_url":"https://github.com/cr0hn/vulnerable-node","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cr0hn%2Fvulnerable-node","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cr0hn%2Fvulnerable-node/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cr0hn%2Fvulnerable-node/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cr0hn%2Fvulnerable-node/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/cr0hn","download_url":"https://codeload.github.com/cr0hn/vulnerable-node/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254478193,"owners_count":22077676,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["analyzer","common-vulnerabilities","identified-vulnerabilities","nodejs","security-analyzers","vulnerability","whitebox"],"created_at":"2024-08-01T09:01:43.348Z","updated_at":"2025-05-16T06:07:52.369Z","avatar_url":"https://github.com/cr0hn.png","language":"JavaScript","readme":"Vulnerable Node\n===============\n\n![Logo](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/logo-small.png)\n\n*Vulnerable Node: A very vulnerable web site written in NodeJS*\n\nCodename | PsEA\n-------- | ----\nVersion | 1.0\nCode | https://github.com/cr0hn/vulnerable-node\nIssues | https://github.com/cr0hn/vulnerable-node/issues/\nAuthor | Daniel Garcia (cr0hn) - @ggdaniel\n\n# Support this project\n\nSupport this project (to solve issues, new features...) by applying the Github \"Sponsor\" button.\n\n# What's this project?\n\nThe goal of this project is to be a project with really vulnerable code in NodeJS, not simulated.\n\n## Why?\n\nSimilar project, like OWASP Node Goat, are pretty and useful for learning process but not for a real researcher or studding vulnerabilities in source code, because their code is not really vulnerable but simulated.\n\nThis project was created with the **purpose of have a project with identified vulnerabilities in source code with the finality of can measure the quality of security analyzers tools**.\n\nAlthough not its main objective, this project also can be useful for:\n\n- Pentesting training.\n- Teaching: learn how NOT programming in NodeJS.\n\nThe purpose of project is to provide a real app to test the quality of security source code analyzers in white box processing.\n\n## How?\n\nThis project simulates a real (and very little) shop site that has identifiable sources points of common vulnerabilities.\n\n## Installation\n\nThe most simple way to run the project is using docker-compose, doing this:\n\n```bash\n\n# git clone https://github.com/cr0hn/vulnerable-node.git vulnerable-node\n# cd vulnerable-node/\n# docker-compose build \u0026\u0026 docker-compose up\nBuilding postgres_db\nStep 1 : FROM library/postgres\n---\u003e 247a11721cbd\nStep 2 : MAINTAINER \"Daniel Garcia aka (cr0hn)\" \u003ccr0hn@cr0hn.com\u003e\n---\u003e Using cache\n---\u003e d67c05e9e2d5\nStep 3 : ADD init.sql /docker-entrypoint-initdb.d/\n....\n```\n\n## Running\n\nOnce docker compose was finished, we can open a browser and type the URL: `127.0.0.1:3000` (or the IP where you deployed the project):\n\n![Login screen](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/login.jpg)\n\nTo access to website you can use displayed in landing page:\n\n- admin : admin\n- roberto : asdfpiuw981\n\nHere some images of site:\n\n![home screen](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/home.jpg)\n\n![shopping](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/shop.jpg)\n\n![purchased products](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/purchased.jpg)\n\n# Vulnerabilities\n\n## Vulnerability list:\n\nThis project has the most common vulnerabilities of `OWASP Top 10 \u003chttps://www.owasp.org/index.php/Top_10_2013-Top_10\u003e`:\n\n- A1  - Injection\n- A2  - Broken Authentication and Session Management\n- A3  - Cross-Site Scripting (XSS)\n- A4  - Insecure Direct Object References\n- A5  - Security Misconfiguration\n- A6  - Sensitive Data Exposure\n- A8  - Cross-Site Request Forgery (CSRF)\n- A10 - Unvalidated Redirects and Forwards\n\n## Vulnerability code location\n\nThe exactly code location of each vulnerability is pending to write\n\n# References\n\nI took ideas and how to explode it in NodeJS using these references:\n\n- https://blog.risingstack.com/node-js-security-checklist/\n- https://github.com/substack/safe-regex\n\n# License\n\nThis project is released under license BSD.\n","funding_links":["https://github.com/sponsors/cr0hn"],"categories":["\u003ca id=\"761a373e2ec1c58c9cd205cd7a03e8a8\"\u003e\u003c/a\u003e靶机\u0026\u0026漏洞环境\u0026\u0026漏洞App","Vulnerable Web apps:","Downloadable Applications","Support"],"sub_categories":["\u003ca id=\"a6a2bb02c730fc1e1f88129d4c2b3d2e\"\u003e\u003c/a\u003eWebApp","Node"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcr0hn%2Fvulnerable-node","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcr0hn%2Fvulnerable-node","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcr0hn%2Fvulnerable-node/lists"}