Skip to content

Commit

Permalink
update walkthrough
Browse files Browse the repository at this point in the history
  • Loading branch information
njmulsqb committed Nov 22, 2024
1 parent 5649ea9 commit c1ecba0
Show file tree
Hide file tree
Showing 2 changed files with 19 additions and 11 deletions.
24 changes: 14 additions & 10 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,16 +15,6 @@ The app demonstrates a vulnerable to do list, following vulnerabilties are curre

---

## WARNING!

Damn Vulnerable Electron Application is damn vulnerable! **Do not upload it to your hosting provider's public html folder or any Internet facing servers**, as they will be compromised. It is recommended using a virtual machine (such as [VirtualBox](https://www.virtualbox.org/) or [VMware](https://www.vmware.com/)), which is set to NAT networking mode.

### Disclaimer

I do not take responsibility for the way in which any one uses this application (DVEA). I have made the purposes of the application clear and it should not be used maliciously. I have given warnings and taken measures to prevent users from installing DVEA on to live servers. If your server is compromised via an installation of DVEA, it is not my responsibility, it is the responsibility of the person/s who uploaded and installed it.

---

### Download

Get your copy of DVEA from the github releases section here: https://github.com/njmulsqb/DVEA/releases/latest
Expand All @@ -44,6 +34,20 @@ electron .

---

### Walkthrough

The walkthrough of this app can be seen at [walkthrough.md](./walkthrough.md)

---

## WARNING!

Damn Vulnerable Electron Application is damn vulnerable! **Do not upload it to your hosting provider's public html folder or any Internet facing servers**, as they will be compromised. It is recommended using a virtual machine (such as [VirtualBox](https://www.virtualbox.org/) or [VMware](https://www.vmware.com/)), which is set to NAT networking mode.

### Disclaimer

I do not take responsibility for the way in which any one uses this application (DVEA). I have made the purposes of the application clear and it should not be used maliciously. I have given warnings and taken measures to prevent users from installing DVEA on to live servers. If your server is compromised via an installation of DVEA, it is not my responsibility, it is the responsibility of the person/s who uploaded and installed it.

### Contributing

DVEA is always open for PRs!
Expand Down
6 changes: 5 additions & 1 deletion walkthrough.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,4 +24,8 @@ The app is registered with a deep-link of `dvea://` which is used to add tasks t

# Deep-link to RCE

Now combining all the above attack vectors we can chain the deep link to achieve RCE using the same payload as in "XSS to RCE" when invoked via the deep link.
Now combining all the above attack vectors we can chain the deep link to achieve RCE using the same payload as in "XSS to RCE" when invoked via the deep link, the payload will look something like

```
dvea://task?add=<a onmouseover="try{const%20 {shell}=require('electron');shell.openPath('/System/Applications/Calculator.app/')}catch(e){console.error(e)}">Hover Me</a>
```

0 comments on commit c1ecba0

Please sign in to comment.