This is a deliberately vulnerable Flask web application designed for:
- Security testing with tools like OWASP ZAProxy
- Educational purposes to demonstrate common web vulnerabilities
- Penetration testing practice
pip install flask
python app.pyThen visit: http://localhost:5001
- Location:
/loginendpoint - Issue: String concatenation in SQL query
- Test: Try username
admin'--or' OR '1'='1
- Location:
/searchendpoint - Issue: User input displayed without escaping
- Test: Search for
<script>alert('XSS')</script>
- Location:
/profileendpoint - Issue: Direct URL access without proper auth check
- Test: Visit
/profile?user_id=1without logging in
- Location:
/uploadendpoint - Issue: No file type or size validation
- Test: Upload executable files or files with malicious names
- Location: All responses
- Issue: No X-Frame-Options, CSP, etc.
- Test: Check response headers with browser dev tools
- admin / admin123
- user1 / password
- test / test
- Basic login/logout
- User registration
- User profiles
- Search functionality
- File upload
This app is perfect for automated security scanning with OWASP ZAProxy. All vulnerabilities should be easily detectable by the scanner.