Comprehensive analysis of security flaws identified in OWASP Juice Shop
Allows attackers to log in as Administrator without a password by exploiting unvalidated SQL queries.
The admin account uses a common, easily guessable password that can be cracked through brute force attacks.
Malicious scripts can be injected via the search bar and executed in victim browsers, enabling session hijacking.
Legal documents are accessible via direct URL manipulation without proper access controls.
The server reveals backup files via the /ftp directory, exposing sensitive system information.
Unauthorised access to the hidden admin page /score-board without proper authentication.
The search function executes HTML locally in the browser without proper sanitization.
Error messages reveal server technologies such as SQLite and Node.js, aiding reconnaissance.