Skip to content

Commit

Permalink
Patched /tmp/tmp2ofxou10/README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
patched.codes[bot] committed Sep 26, 2024
1 parent a1d8f89 commit d5ff143
Showing 1 changed file with 27 additions and 0 deletions.
27 changes: 27 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
## DVPWA - Damn Vulnerable Python Web Application

This web application is intentionally designed to be vulnerable to various web security flaws. Its purpose is to serve as a learning tool for demonstrating and practicing web security principles. It is likely to be used by developers, security researchers, and students to learn about web application vulnerabilities.

### Inputs

The application takes user inputs through various forms and URLs. These include:

* **Login Form:** Accepts username and password to authenticate users. (Vulnerable to SQL Injection)
* **Student Creation Form:** Accepts student names. (Vulnerable to SQL Injection and Stored XSS)
* **Course Creation Form:** Accepts course titles and descriptions. (Vulnerable to Stored XSS)
* **Evaluation Form:** Accepts student IDs, course IDs, and points to evaluate students.
* **Course Review Form:** Accepts review text for courses. (Vulnerable to Stored XSS)


### Outputs

The application dynamically generates HTML pages to display information and interact with users. Outputs include:

* **Student List:** Displays a list of students. (Vulnerable to SQL Injection and Stored XSS)
* **Student Details:** Displays student information, including their marks in different courses. (Vulnerable to SQL Injection)
* **Course List:** Displays a list of courses. (Vulnerable to Stored XSS)
* **Course Details:** Displays course information, including reviews. (Vulnerable to Stored XSS)
* **Evaluation Results:** Displays the evaluation results after a student is evaluated for a course.
* **Course Review Display:** Displays user-submitted reviews for courses. (Vulnerable to Stored XSS)

The application also uses cookies for session management, which makes it vulnerable to session fixation attacks.

0 comments on commit d5ff143

Please sign in to comment.