AppSec Blog

Spot the Vuln - Curiosity - SQL Injection

Details Affected Software: Comment-Rating Plugin Fixed in Version: 2.9.24 Issue Type: SQL Injection (SQLi) Original Code: Found Here Details This week's vulnerability is was a tricky one. The bug patched in this change list affected the Comment-Rating plugin for WordPress (fixed in 2.9.24). Let's take the bug step by step. First, the application takes a … Continue reading Spot the Vuln - Curiosity - SQL Injection


Spot the Vuln - Curiosity

The cure for boredom is curiosity. There is no cure for curiosity. Ellen Parr Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the vulnerable code and try to identify where the security … Continue reading Spot the Vuln - Curiosity


Spot the Vuln - Flag - Cross Site Scripting

Details Affected Software: Drupal Core Fixed in Version: 6.1 Issue Type: Cross Site Scripting (XSS) Original Code: Found Here Details This week's cross site scripting vulnerability is somewhat unusual in that it exists in javascript, rather than server side. The checkPlain function is used to output encode data fetched via Ajax/XHR (for instance, dynamically loading … Continue reading Spot the Vuln - Flag - Cross Site Scripting


Four Attacks on OAuth - How to Secure Your OAuth Implementation

This article briefly introduces an emerging open-protocol technology, OAuth, and presents scenarios and examples of how insecure implementations of OAuth can be abused maliciously. We examine the characteristics of some of these attack vectors, and discuss ideas on countermeasures against possible attacks on users or applications that have implemented this protocol. An Introduction to the … Continue reading Four Attacks on OAuth - How to Secure Your OAuth Implementation


Spot the Vuln - Flag

Every normal man must be tempted, at times, to spit upon his hands, hoist the black flag, and begin slitting throats. ~H.L. Mencken Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the … Continue reading Spot the Vuln - Flag