Damn Vulnerable Serverless Application (DVSA) is a deliberately vulnerable application aiming to be an aid for security professionals to test their skills and tools in a legal environment, help developers better understand the processes of securing serverless applications and to aid both students & teachers to learn about serverless application security in a controlled class room environment.
The aim of DVSA is to practice some of the most common serverless vulnerabilities, with a simple straightforward interface.
Please note, there are both documented & undocumented vulnerabilities with this software. This is intentional. You are encouraged to try and discover as many issues as possible.
Do not install DVSA on a production account
We do not take responsibility for the way in which any one uses this application (DVSA). We have made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing DVSA on to production accounts.
Deployment from Application Repository
-
Deploy DVSA from the AWS Serverless Application Repository
-
After deployment is complete. Click on 'View CloudFormation Stack'
-
Under 'Outputs' you will find the URL for the application (DVSA Website URL)
- Node 8.16.2 (switching between Node versions during dev)
- python2 (needed for npm i node-gyp. You can using
npm config set python /path/to/your/python2
)
$ ./dvsa.sh client-build
$ ./dvsa.sh client-connect --stack <STACK_NAME>
$ ./dvsa.sh client-update --stack/--bucket
$ ./dvsa.sh client-update -h/--help
for more options
$ ./dvsa.sh client-start
- Make desired changes to backend code under backend/functions
- Make desired changes to your cloudformation template.yml
- If you need post-deployment changes, you can add files to
backend/deployment/
and use thebackend/deployment/dvsa_init.py
function that runs at the end of the deployment to execute the required actions. $ ./dvsa.sh package-template
(OPTIONAL: -h/--help for more options)- Deploy the output template-file with Cloudformation console/cli
-
You can use SAM Local to start Lambda functions and APIs
-
Alternatively, you can use LocalStack
Note: If you want to point your local client to your local backend, run $ ./dvsa.sh client-connect
and REPLACE the endpoint of ServiceEndpoint
with http://localhost:3000
(It will still be using the Cognito pools in AWS).
DVSA sends receipts in the email. You can use the built-in Inbox page within the application to get the emails and obtain the receipts. Each user will be automatically assigned an email from 1secmail.com
which will be automatically verified. Real emails will be sent to their account and will appear in the application Inbox page.
If you want users to receive emails to their actual registered email account (e.g. gmail):
- Send an email verification link to the desired email address, by running the following command (after clicking on the received link, emails will also be sent to their actual email address):
aws ses verify-email-identity --email-address <your_email>
- Request a sending limit increase. This will allow your entire cloud account to send emails to any address.
see LESSONS for information about hacking DVSA.
see VIDEOS for how to deploy, use and hack DVSA.
OWASP Top 10 - Serverless Interpretation
Deep-Dive into Serverless Attacks - Series
OWASP Serverless Top 10 Project
Twitter account (hackable)
Slack Channel #project-sls-top-10
DVSA was created by Tal Melamed
Damn Vulnerable Serverless Application (DVSA) is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
Damn Vulnerable Serverless Application (DVSA) is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with Damn Vulnerable Serverless Application (DVSA). If not, see http://www.gnu.org/licenses/.