In this part we will discover a new vulnerability in Webgoat application and examine the finding in Contrast Security.
It is important to reiterate that Contrast Security identifies vulnerabilities by looking at the normal traffic that goes through the application. With that in mind, let’s identify a SQL injection vulnerability within Webgoat using Contrast.
Use the username webgoat
and password webgoat
to log into the Webgoat application.
Navigate to the Injection Flaws
–> String SQL injection
lesson.
Within the Enter your last name:
textbox, enter Smith
or any other string into the field and click on Go
button:
When you perform this action, Contrast is passively monitoring the security of the application including the request made to the application, how that request is handled by the application, and other actions such as queries to the database layer.
ulnerabilities
tab within the WebGoat
application. As you can see, the Contrast agent has identified two new vulnerabilities: Cross-Site Scripting (XSS)
and SQL injection
.Details
describing the data flow of the vulnerability from source
to sink
including any propagators
.HTTP Info
that shows the query string parameters, request body, and headers associated with the request.How to Fix
information providing different approaches to remediating this type of vulnerability.