Common Web Vulnerabilities

OWASP Top 10 Examples

This document summarizes common vulnerabilities in web applications, especially in the context of penetration testing, whether for internal or publicly available applications.

1. Broken Authentication / Access Control

Description:

Example Vulnerable App:

PoC:

    Email: ' or 0=0 #
    Password: any value

2. Malicious File Upload

Description:

Example:

3. Command Injection

Description:

Example:

PoC:

    ip=127.0.0.1 | <command>

4. SQL Injection (SQLi)

Description:

Vulnerable Code Example:

$query = "select * from users where name like '%$searchInput%'";

Exercise

To which of the above categories does public vulnerability 'CVE-2014-6271' belongs to?

Description for CVE-2014-6271
A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

flag: Command Injection