Skip to content

Vulnerable Laravel application used in Laracon Amsterdam 2019 Presentation "How your Laravel application can get hacked, and how to prevent that?"

Notifications You must be signed in to change notification settings

laravel-at/vulnerable-laravel-app

 
 

Repository files navigation

Vulnerable Laravel App

This application was used in my Laracon EU 2019 Amsterdam presentation to demonstrate the following vulnerabilities that are usually caused by poor development practises or mistakes in your code.

This application contains critical security vulnerabilities, DO NOT deploy or run this application outside of your localhost (or expose your localhost while running this)

Requirements

  • Docker
  • Docker Compose
  • PHP (>v7.1 preferably) & Composer

Installation

  • composer install
  • docker-compose up -d
  • docker exec laracon-app php artisan migrate --seed

Vulnerabilities & tips

SQL Injection

  • There's a vulnerable API endpoint at http://localhost:1234/api/events?sort=id (assuming you're running this in docker)
  • There are many ways to exploit this, if you attended the talk you'll know one very specific tool for this

Object Injection

Privilege Escalation

  • This project's docker compose setup intentionally configures Laravel scheduler to run as root, that's all you need to know ;)

About

Vulnerable Laravel application used in Laracon Amsterdam 2019 Presentation "How your Laravel application can get hacked, and how to prevent that?"

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • PHP 79.2%
  • HTML 19.2%
  • Dockerfile 1.1%
  • Vue 0.5%