🔓 VulnBlog

A Deliberately Vulnerable Web Application for Security Testing

⚠️ WARNING: This application contains intentional security vulnerabilities for educational purposes only!

Welcome to VulnBlog

🎯 Vulnerabilities Present in This Application:

  • 1 Broken Access Control - Direct object references, missing authorization
  • 2 Cryptographic Failures - Weak password hashing, plain text storage
  • 3 Injection - SQL injection, XSS vulnerabilities
  • 4 Insecure Design - Poor security architecture
  • 5 Security Misconfiguration - Default credentials, verbose errors
  • 6 Vulnerable Components - Outdated libraries (simulated)
  • 7 Authentication Failures - Weak session management
  • 8 Data Integrity Failures - No input validation
  • 9 Logging Failures - No security logging
  • 10 SSRF - Server-side request forgery

Recent Blog Posts

My First Post

Welcome to my blog! This is a test post.

Posted by: admin | View Comments

Security Best Practices

Here are some security tips... (ironically posted on a vulnerable site)

Posted by: user123 | View Comments

Login

Admin Panel

⚠️ This page should require admin privileges (Broken Access Control)

User Management

User ID: 1 - admin View Profile Delete
User ID: 2 - guest View Profile Delete
User ID: 3 - john_doe View Profile Delete

System Information

Database: MySQL 5.7.0 (Outdated - Vuln #6)

PHP Version: 7.2.0 (Outdated - Vuln #6)

Debug Mode: Enabled (Vuln #5)

Error Reporting: Full (Vuln #5)

File Upload

File Upload Vulnerabilities:

• No file type validation

• No file size limits

• Try uploading: .php, .jsp, .exe files

SSRF Test URLs:

http://localhost:8080/admin
file:///etc/passwd

User Profile

Try changing this to access other users' profiles (IDOR)

Profile Actions