This project is a Flask web application designed with intentional security vulnerabilities for educational purposes.
- Install dependencies:
pip install -r requirements.txt - Run the application:
python app.py
-
SQL Injection
- Access via:
http://127.0.0.1:8000/search?name=<name> - Example:
http://127.0.0.1:8000/search?name=' OR '1'='1
- Access via:
-
Cross-Site Scripting (XSS)
- Access via:
http://127.0.0.1:8000/welcome?username=<script>alert('XSS')</script>
- Access via:
-
Insecure Direct Object Reference (IDOR)
- Access via:
http://127.0.0.1:8000/file?file_name=filename - Example: Place a file in the
staticdirectory and access it via the URL.
- Access via:
This application is for educational purposes only and should not be used in production environments.
"# vulnerable-website"