This application is designed to test vulnerability detection and remediation tools. It includes multiple known CVEs across different dependency categories.
-
PyYAML 5.3.1 - CVE-2020-14343
- Arbitrary code execution via unsafe YAML deserialization
- Exploited in
/parse_yamlendpoint
-
Pillow 8.0.0 - Multiple CVEs
- Buffer overflow vulnerabilities
- Image processing vulnerabilities
-
Cryptography 3.3.0 - CVE-2023-23931
- Cipher.update_into memory corruption
-
Flask 2.0.1 - CVE-2023-30861
- Cookie parsing vulnerability
-
Requests 2.25.0 - CVE-2023-32681
- Proxy-Authorization header information leak
-
Jinja2 2.11.0 - CVE-2020-28493
- Regular Expression Denial of Service (ReDoS)
-
Django 3.1.0 - Multiple CVEs
- Various security issues in older versions
-
urllib3 1.26.0 - CVE-2023-43804
- Cookie request header leak
-
SQLParse 0.4.0 - CVE-2021-32839
- Regular Expression Denial of Service
-
Notebook 6.1.5 - CVE-2021-32797
- Cross-Site Scripting (XSS) vulnerabilities
-
Certifi 2020.12.5
- Outdated root certificates
-
Setuptools 50.0.0 - CVE-2022-40897
- Regular Expression Denial of Service
-
IPython 7.16.0 - CVE-2022-21699
- Execution with unnecessary privileges
Beyond vulnerable dependencies, the application code itself contains security issues:
- SSTI (Server-Side Template Injection): Root endpoint uses user input directly in template
- YAML Deserialization: Uses unsafe
yaml.load()allowing code execution - Debug Mode: Flask runs with debug=True
- Bind to 0.0.0.0: Exposed to all network interfaces
# Create virtual environment
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install vulnerable dependencies
pip install -r requirements.txtpython app.pyThe application will run on http://localhost:5000
Use tools like:
pip-audit- For Python dependency scanningsafety check- For known security vulnerabilitiesbandit- For code security issuessnyk test- Comprehensive vulnerability scanning- Your custom vulnerability elimination agent
Example commands:
pip install pip-audit
pip-audit -r requirements.txt
pip install safety
safety check -r requirements.txt
pip install bandit
bandit -r .A vulnerability scanner should detect:
- 13+ vulnerable packages
- Multiple high-severity CVEs
- Code-level security issues (if using static analysis)
To fix vulnerabilities, update to latest stable versions:
flask>=3.0.0
requests>=2.31.0
pillow>=10.0.0
cryptography>=41.0.0
pyyaml>=6.0.1
jinja2>=3.1.2
django>=4.2.0
urllib3>=2.0.0
certifi>=2023.7.22
setuptools>=65.5.1
sqlparse>=0.4.4
notebook>=7.0.0
ipython>=8.10.0
MIT License - For testing purposes only
This application is for educational and testing purposes only. The vulnerabilities are intentional and should never be deployed to production environments.