AppSec Blog

Spot The Vuln - Notes - SQL Injection

Details Affected Software: Sermon Browser WordPress Plugin Fixed in Version: .44 Issue Type: Cross Site Scripting Original Code: Found Here Details There are a couple of different issues here, but let's focus on what the developers patched. On line 27, the developer uses the $_GET[''getid3'] value to build a dynamic SQL statement. This is classic … Continue reading Spot The Vuln - Notes - SQL Injection


Spot the Vuln - Notes

The best way to waste your life, ... is by taking notes. The easiest way to avoid living is to just watch. Look for the details. Report. Don't participate. Chuck Palahniuk Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code … Continue reading Spot the Vuln - Notes


Spot the Vuln - Percentage - Cross Site Scripting

Details Affected Software: Sermon Browser WordPress Plugin Fixed in Version: .44 Issue Type: Cross Site Scripting Original Code: Found Here Details There is a lot going on here in this code snippet. First, let's talk about the patch. The patch adds a check to ensure the user requesting has the rights to edit a post. … Continue reading Spot the Vuln - Percentage - Cross Site Scripting


Spot the Vuln - Percentage

100 per cent of us die, and the percentage cannot be increased. C.S. Lewis Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the vulnerable code and try to identify where the security … Continue reading Spot the Vuln - Percentage


Checklists, software and software security

There are practical applications of checklists in many different fields. Aviation, project engineering, now even surgery. But what about software? Sure, checklists are sometimes used in code reviews, to good effect. But can we do more, can we get the same thing out of checklists that pilots do, or that surgeons do? Continue reading Checklists, software and software security