Skip to content

Educational penetration testing using Vulhub. Recreated and documented exploits for 11 high-impact vulnerabilities across popular web applications.

Notifications You must be signed in to change notification settings

cyberwithcyril/VulhubPenTestingReport

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

12 Commits
Β 
Β 
Β 
Β 

Repository files navigation

Educational penetration testing using Vulhub. Recreated and documented exploits for 11 high-impact vulnerabilities across popular web applications.

πŸ“₯ View the Full Report (PDF)


πŸ” Vulnerability Lab – Vulhub Exploits

This repository contains exploit walkthroughs and PoCs for a curated list of known vulnerabilities, recreated using Vulhub β€” a Docker-based environment for learning and practicing exploitation techniques.

⚠️ Warning: This repository is for educational purposes only. Use these techniques responsibly and only in controlled environments. Unauthorized testing on systems without permission is illegal and unethical.


πŸ“ Exploits Covered

# Target Application CVE ID Type
1 Apache Superset 2.0.1 CVE-2023-27524 Authentication Bypass
2 Celery 3.1.23 + Redis CVE-2020-11981 Arbitrary Code Execution
3 ThinkPHP 5.0.9 in-sqlinjection SQL Injection
4 Apache Tomcat CVE-2017-12615 Remote Code Execution (JSP Upload)
5 Adobe ColdFusion 8.0.1 CVE-2010-2861 Directory Traversal
6 GitLab 13.10.1 CVE-2021-22205 Remote Code Execution
7 Jenkins 2.46.1 CVE-2017-1000353 Remote Code Execution
8 Metabase 2 CVE-2023-38646 Pre-authentication RCE
9 Nexus Repository Manager CVE-2024-4956 Directory Traversal
10 Glassfish 4.1.0 CVE-2017-1000028 Directory Traversal
11 phpMyAdmin 4.8.1 CVE-2018-12613 Local File Inclusion (LFI)

πŸ› οΈ Setup Instructions

  1. Clone Vulhub:

    git clone https://github.com/vulhub/vulhub.git
    cd vulhub
  2. Navigate to the Application Directory:

    cd <application-directory>
  3. Launch the Vulnerable Environment:

    docker-compose up -d
  4. Access and Test: Visit the service URL on your browser (e.g., http://localhost:8080) and follow walkthrough steps to exploit each vulnerability.


✍️ Credits

This project is a collaborative effort by:

  • Cyril Thomas – Exploit research, testing, and documentation.
  • Michelle Waldenmaier – Exploit research, testing, and documentation.

Equal contribution was made by both authors.

Inspired by the incredible work at Vulhub, which provides containerized vulnerable environments.


πŸ” License

This repository is licensed under the MIT License.

About

Educational penetration testing using Vulhub. Recreated and documented exploits for 11 high-impact vulnerabilities across popular web applications.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published