DVWA Example Report
DVWA Example Report
\seval\s*\(
ID: 37 warn
/home/chris/src/DVWA-master/dvwa/js/dvwaPage.js:6
1: /* Help popup */
2:
3: function popUp(URL) {
4: day = new Date();
5: id = day.getTime();
6: eval("page" + id + " = window.open(URL, '" + id + "', 'toolbar=0,scrollbars=1,location=0,statusbar=0,menubar=0,resizable=1,
7: }
8:
9: /* Form validation */
10:
11: function validate_required(field,alerttxt)
Questionable use of eval. Discuss with Engineering if this can be done more safely.
\sshell_exec\s*\(
/home/chris/src/DVWA-master/vulnerabilities/exec/source/high.php:26
It looks like it may be possible to perform a shell-injection here. Discuss with Engineering whether $target could be manipulated maliciously.
\supdate
ID: 101 critical
/home/chris/src/DVWA-master/vulnerabilities/captcha/source/high.php:30
It looks very likely that the query executed on L32 is vulnerable to SQL injection. Discuss with Engineering immediately.