xvna: Extreme Vulnerable Node Application
XVNA
Extreme Vulnerable Node Application
XVNA is an extremely vulnerable node application coded in Nodejs(Expressjs)/MongoDB that helps security enthusiasts to learn application security. it’s not counseled to host this application online as it is intended to be Vulnerable. We tend to suggest hosting this application in native setting and sharpening your application security skills with any tools of your own selection. It’s all legal to interrupt or hack into this. the concept is to evangelize application security to the community is probably the best and elementary method. Learn and acquire these skills permanently purpose. However, you utilize these skills and content isn’t our responsibility.
Warning
Extreme Vulnerable Node Application (XVNA) is most vulnerable, don’t transfer it to your hosting provider’s public folder or any net-facing servers, as they’ll be compromised. It is recommended to use localhost.
List of Vulnerability
- A1:2017-Injection
- OS Injection
- NOSql Injection
- Server-side Js Injection
- A2:2017-Broken Authentication
- A3:2017-Sensitive Data Exposure
- Sensitive Data
- Headers
- A6:2017-Security Misconfiguration
- A7:2017-Cross-Site Scripting
- A8:2017-Insecure Deserialization
Setup
- Clone the repo:
git clone https://github.com/vegabird/xvna.git
- Start mongoDB
- Create DB xvna in mongoDB
- Import the Collection to mongoDB given from folder collection
- Start the xvna from root folder using the command: node index.js
- We are good to go, hit localhost:3000/app
- Login Credential: email-> admin@xvna.com password -> password
Demo
Source: https://github.com/vegabird/