AppSec Blog

Spot the Vuln - Fall

Some rise by sin, and some by virtue fall. William Shakespeare Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the vulnerable code and try to identify where the security vulnerability is. Every … Continue reading Spot the Vuln - Fall


Spot the Vuln - Charming - SQL Injection

Details Affected Software: StatPressCN Fixed in Version: 1.9.1 Issue Type: SQL Injection Original Code: Found Here Details This patch was full of interesting tidbits. First, the change log for this patch is as follows: **1.9.1** + fix a flaw allowing a remote cross-site scripting attack Keep the change list description in mind as we go … Continue reading Spot the Vuln - Charming - SQL Injection


Spot the Vuln - Charming

It is absurd to divide people into good and bad. People are either charming or tedious. Oscar Wilde Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the vulnerable code and try to … Continue reading Spot the Vuln - Charming


Spot the Vuln - Proportion - Cross Site Scripting

Details Affected Software: Lazyest-Gallery Fixed in Version: 0.9 Issue Type: Cross Site Scripting (XSS) Original Code: Found Here Details For most security issues, I give the developer the benefit of the doubt. It's tough to keep track of all the corner cases and security nuances. For this diff however, there is no excuse. First, let's … Continue reading Spot the Vuln - Proportion - Cross Site Scripting


Spot the Vuln - Proportion

Rocket science has been mythologized all out of proportion to its true difficulty. John Carmack Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the vulnerable code and try to identify where the … Continue reading Spot the Vuln - Proportion