Skip to content

ahmedyarub/distributed-app

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

A Distributed System with Cross-service Vulnerabilities

A sample project used for demoing API Guard

This demo project consists of two microservices: responder-service exposes the endpoint http://localhost:8081/responder/lower/{param}. This endpoint has an XSS vulnerability due the fact that the path variable param is returned as-as (after converting it to lower letter), which means that a malicious user can directly write to the response.

This category of errors is easily detected by static-analysers that can do cross-procedure analysis, such as CodeQL.

Meanwhile, the microservice caller-service exposes the endpoint http://localhost:8080/web_call/{param}. This endpoint calls responder-service, which means that it is also vulnerable to XSS attacks since the response of responder-service, vulnerable to XSS attacks, is returned as is. issue.png

Fore details about XSS vulnerabilities, please refer to Using CodeQL to detect client-side vulnerabilities in web applications

About

A sample project used for demoing API Guard

Resources

Stars

Watchers

Forks

Languages