I have been busy lately preparing a demo program written in python using the Flask framework. There are a lot of tutorials on youtube and are easy to follow but are not complete or meaning not an app that may serve as a guide to really start a simple web application. By the way when I say a web application, it should have considered at least OWASP defense mechanism in the initial design and should have a session manager and it uses popularly used database. I am not saying that this CSRF and CSP implementation in this web application is without possible vulnerability, it is just a demo how it is possible to implement them.
The Web App in Details
The demo code I have prepared uses mysql(a popular database used by many web applications), CSRF(cross site request forgery), a simple csp(content security policy) and of course the popular Flask framework. It is also worth mentioning that I also implement a custom(I said custom because I did not used the standard way) session manager(but it is not really a session manager). And finally I used css to produce a nice and presentable login screen. I also used multi file system structure which means some of the variables were stored on a separate file. I could have stored commonly used functions on it but since it is a very simple web application, I thought that it is not necessary but in a larger project, storing functions on a separate file could preserve its readability and would be easier to maintain. I have posted a sample code which can be found on my post Global Variables Handling across PyQt6 Windows.
Here is the screenshot:
You may use the following login credentials:
Username: admin
Password: Appl3Tr33.456
Please do note that the encryption/decryption of the password was not included in this post but I have a code snippet published on my post PyQt6 Desktop App Template series. You may study the code on the login.py and mainw.py where the user management system was implemented.
And here is the Dashboard that comes out after logging in successfully:
Testing the CSP
To test the CSP part, I intently put some inline styles in my index.html file and here is the original screen:
The CSRF Implementation
I have to dig deeper by researching and it seems that a similar problem or project has been discussed at stackoverflow and I also used the recommended solution and it worked for me, you may check the code snippet here: using flask_wtf.csrf without wtf_forms
Some SQL Injection Testing
I also perform some sql injection test using these three payloads:
?id=a' UNION SELECT "text1","text2";-- -&Submit=Submit
?id=a UNION SELECT 1,2;-- -&Submit=Submit
ID: a' UNION SELECT "text1","text2";-- -&Submit=Submit
The procedure I used to test this can be found on my previous post(SQL Injection Prevention checklist and Testing). None of the 3 payloads manage to penetrate the web app.
I also tried to use the payload I mentioned on my previous post which can be downloaded here. And it seems that it has certain vulnerability as one of the payloads manage to display the location of the python script but when I tried to reproduce the error in BurpSuite, it seems that once the program encounter a possible attack, it will always return a "Bad Request" even when I use the valid login credentials, and it will only return to normal when I re-run the python program. My guess is, it is probably a built-in anti-hacking feature of flask?
The mysql table structure:
The code:
I have uploaded the entire project to my github page and can be freely downloaded there. Here is the direct link : Python Flask Login.
No comments:
Post a Comment