This document assumes the reader is already familiar with web application security, and is able to find security bugs independently.
Potion Shop is vulnerable to persistent XSS. Trigger the JavaScript alert(1)
, and write a brief explanation of how an attacker would use this vulnerability to harm users.
Potion Shop is vulnerable to CSRF. Create a proof of concept HTML page showing how an attacker would exploit this flaw, and explain how an attacker would use the page in a real attack.
Potion Shop is vulnerable to RCE. Create a proof of concept payload that causes attacker supplied code to execute on the webserver.
Potion Shop is vulnerable to SQL injection. Show how an attacker can use this weakness to access private data from the database. What else can an attacker do with this security bug?
In Potion Shop, an attacker can create new records in the database with the wrong author. Show how this attack works, and explain the problem with the current implementation.