Skip to content

Commit 85b1709

Browse files
committed
updated documentation
1 parent ce4b3bc commit 85b1709

File tree

3 files changed

+142
-6
lines changed

3 files changed

+142
-6
lines changed

.gitignore

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1 +1,85 @@
11
# Created by .ignore support plugin (hsz.mobi)
2+
### Node template
3+
# Logs
4+
logs
5+
*.log
6+
npm-debug.log*
7+
8+
# Runtime data
9+
pids
10+
*.pid
11+
*.seed
12+
13+
# Directory for instrumented libs generated by jscoverage/JSCover
14+
lib-cov
15+
16+
# Coverage directory used by tools like istanbul
17+
coverage
18+
19+
# nyc test coverage
20+
.nyc_output
21+
22+
# Grunt intermediate storage (http://gruntjs.com/creating-plugins#storing-task-files)
23+
.grunt
24+
25+
# node-waf configuration
26+
.lock-wscript
27+
28+
# Compiled binary addons (http://nodejs.org/api/addons.html)
29+
build/Release
30+
31+
# Dependency directories
32+
node_modules
33+
jspm_packages
34+
35+
# Optional npm cache directory
36+
.npm
37+
38+
# Optional REPL history
39+
.node_repl_history
40+
### JetBrains template
41+
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm, CLion, Android Studio and Webstorm
42+
# Reference: https://intellij-support.jetbrains.com/hc/en-us/articles/206544839
43+
44+
# User-specific stuff:
45+
.idea/workspace.xml
46+
.idea/tasks.xml
47+
.idea/dictionaries
48+
.idea/vcs.xml
49+
.idea/jsLibraryMappings.xml
50+
51+
# Sensitive or high-churn files:
52+
.idea/dataSources.ids
53+
.idea/dataSources.xml
54+
.idea/dataSources.local.xml
55+
.idea/sqlDataSources.xml
56+
.idea/dynamic.xml
57+
.idea/uiDesigner.xml
58+
59+
# Gradle:
60+
.idea/gradle.xml
61+
.idea/libraries
62+
63+
# Mongo Explorer plugin:
64+
.idea/mongoSettings.xml
65+
66+
## File-based project format:
67+
*.iws
68+
69+
## Plugin-specific files:
70+
71+
# IntelliJ
72+
/out/
73+
74+
# mpeltonen/sbt-idea plugin
75+
.idea_modules/
76+
77+
# JIRA plugin
78+
atlassian-ide-plugin.xml
79+
80+
# Crashlytics plugin (for Android Studio and IntelliJ)
81+
com_crashlytics_export_strings.xml
82+
crashlytics.properties
83+
crashlytics-build.properties
84+
fabric.properties
85+

LICENSE

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
Copyright (c) - cr0hn[at]cr0hn.com
2+
3+
Project home: https://github.com/cr0hn/vulnerable-node
4+
5+
Redistribution and use in source and binary forms, with or without modification,
6+
are permitted provided that the following conditions are met:
7+
8+
1. Redistributions of source code must retain the above copyright notice,
9+
this list of conditions and the following disclaimer.
10+
11+
2. Redistributions in binary form must reproduce the above copyright
12+
notice, this list of conditions and the following disclaimer in the
13+
documentation and/or other materials provided with the distribution.
14+
15+
3. Neither the name of nor the names of its contributors may be used
16+
to endorse or promote products derived from this software without
17+
specific prior written permission.
18+
19+
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
20+
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21+
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22+
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
23+
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
24+
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
25+
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
26+
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27+
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
28+
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

README.rst renamed to README.md

Lines changed: 30 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
11
Vulnerable Node
22
===============
33

4-
5-
.. figure:: https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/logo/logo.png
6-
:align: left
4+
![Logo](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/logo.png)
75

86
*Vulnerable Node: A very vulnerable web site written in NodeJS*
97

@@ -19,7 +17,7 @@ The goal of this project is to be a project with really vulnerable code in NodeJ
1917

2018
## Why?
2119

22-
Similar project, like OWASP Node Goat, are pretty and useful for learning process, but not for a real researcher or studding vulnerabilities in source code.
20+
Similar project, like OWASP Node Goat, are pretty and useful for learning process but not for a real researcher or studding vulnerabilities in source code, because their code is not really vulnerable but simulated.
2321

2422
This project was created with the **purpose of have a project with identified vulnerabilities in source code with the finality of can measure the quality of security analyzers tools**.
2523

@@ -38,8 +36,10 @@ This project simulates a real (and very little) shop site that has identifiable
3836

3937
The most simple way to run the project is using docker-compose, doing this:
4038

41-
.. code-block: bash
39+
```bash
4240

41+
# git clone https://github.com/cr0hn/vulnerable-node.git vulnerable-node
42+
# cd vulnerable-node/
4343
# docker-compose build && docker-compose up
4444
Building postgres_db
4545
Step 1 : FROM library/postgres
@@ -49,6 +49,26 @@ The most simple way to run the project is using docker-compose, doing this:
4949
---> d67c05e9e2d5
5050
Step 3 : ADD init.sql /docker-entrypoint-initdb.d/
5151
....
52+
```
53+
54+
## Running
55+
56+
Once docker compose was finished, we can open a browser and type the URL: `127.0.0.1:3000` (or the IP where you deployed the project):
57+
58+
![Login screen](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/login.jpg)
59+
60+
To access to website you can use displayed in landing page:
61+
62+
- admin : admin
63+
- roberto : asdfpiuw981
64+
65+
Here some images of site:
66+
67+
![home screen](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/home.jpg)
68+
69+
![shopping](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/shop.jpg)
70+
71+
![purchased products](https://raw.githubusercontent.com/cr0hn/vulnerable-node/master/images/purchased.jpg)
5272

5373
# Vulnerabilities
5474

@@ -74,4 +94,8 @@ The exactly code location of each vulnerability is pending to write
7494
I took ideas and how to explode it in NodeJS using these references:
7595

7696
- https://blog.risingstack.com/node-js-security-checklist/
77-
- https://github.com/substack/safe-regex
97+
- https://github.com/substack/safe-regex
98+
99+
# License
100+
101+
This project is released under license BSD.

0 commit comments

Comments
 (0)