Application vulnerable to XSS.
Attacker has only one endpoint '/', which listens for incoming
connections and logs all the query parameters to stdout
.
- Starting the vulnerable application
docker run -it \
-e PORT=8080 \
-e JWT_SECRET="$(head -c 50 /dev/urandom | base64)" \
-p 8080:8080 \
murtazau/lab-xss app
- Starting the attacker
docker run -it \
-e ATTACKER_PORT=5000 \
-p 5000:5000 \
murtazau/lab-xss attack
git clone github.com/murtaza-u/lab-xss
cd lab-xss
go build -o lab-xss cmd/lab-xss/main.go
- Starting the vulnerable application
export JWT_SECRET="$(head -c 50 /dev/urandom | base64)"
export PORT=8080
./lab-xss app
- Starting the attacker
export ATTACKER_PORT=5000
./lab-xss attack