Skip to content

TiiZss/JavaVulnerableLab

 
 

Repository files navigation

Java Vulnerable Lab (Fixed 2026 Edition)

License: MIT Docker Image Fixed by TiiZss

Buy Me A Coffee

Overview

This is a fork of the original "Vulnerable" Web Application developed by Cyber Security and Privacy Foundation (www.cysecurity.org). We have updated and fixed it to work seamlessly in 2026 environments.

Original Repository: CSPF-Founder/JavaVulnerableLab

Key Updates & Fixes (2026)

  • Containerization: Fully fixed Dockerfile and docker-compose.yml to support modern Docker environments.
    • Switched to maven:3-jdk-8 for building.
    • Switched to tomcat:9.0-jdk8 for runtime stability.
  • XSS Challenges:
    • Reto 2 (Fixed): Implemented missing "Label Filters" challenge (xss2.jsp), allowing bypass techniques.
    • Reto 3 (Fixed): Implemented missing "Non-recursive Filters" challenge (xss3.jsp), testing nested tag payloads.
  • Footer: Updated copyright information.

How to Use

Quick Start with Docker (Recommended)

  1. Install Docker and Docker Compose.
  2. Clone this repository:
    git clone https://github.com/TiiZss/JavaVulnerableLab.git
    cd JavaVulnerableLab
  3. Run the container:
    docker-compose up -d --build
  4. Access the lab at: http://localhost:8080/JavaVulnerableLab

XSS Challenges

Navigate to http://localhost:8080/JavaVulnerableLab/vulnerability/xss/ to access the challenges.

  • Reto 2: Try to evade filter using <SCRIPT> or <img onerror>.
  • Reto 3: Try "nested" payloads like <scr<script>ipt>.

Original Description

This app is intended for Java Programmers and other people who wish to learn about Web application vulnerabilities and write secure code.

Warning: Don't run this app in Your Main Machine or in an online server. Install it in a Virtual Machine or Container.

About

Vulnerable Java based Web Application

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages

  • Java 92.0%
  • CSS 4.2%
  • XSLT 1.9%
  • Dockerfile 0.6%
  • Python 0.6%
  • Shell 0.4%
  • Batchfile 0.3%