OWASP Juice Shop
OWASP Juice Shop is probably the most modern and sophisticated insecure web application! It can be used in security trainings, awareness demos, CTFs and as a guinea pig for security tools! Juice Shop encompasses vulnerabilities from the entire OWASP Top Ten along with many other security flaws found in real-world applications!
The application contains a vast number of hacking challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. Finding this score board is actually one of the (easy) challenges!
The most trustworthy online shop out there. ( @dschadow) — The best juice shop on the whole internet! ( @shehackspurple) — Actually the most bug-free vulnerable application in existence! ( @vanderaj) — First you 😂😂then you 😢 ( @kramse) — But this doesn’t have anything to do with juice. ( @coderPatros’ wife)
This program is free software: You can redistribute it and/or modify it under the terms of the MIT License. OWASP Juice Shop and any contributions are Copyright © by Bjoern Kimminich 2014-2021.
Main Selling Points
- Free and Open source: Licensed under the MIT license with no hidden costs or caveats
- Easy-to-install: Choose between node.js, Docker and Vagrant to run on Windows/Mac/Linux as well as all major cloud providers
- Self-contained: Additional dependencies are pre-packaged or will be resolved and downloaded automatically
- Beginner-friendly: Hacking Instructor scripts with optional tutorial mode guide newcomers through several challenges while explaining the underlying vulnerabilities
- Gamification: The application notifies you on solved challenges and keeps track of successfully exploited vulnerabilities on a Score Board
- Self-healing: Wiped clean and repopulated from scratch on every server startup while automatically persisting progress in your browser or via manual local backup
- Re-branding: Fully customizable in business context and look & feel to your own corporate or customer requirements
- CTF-support: Challenge notifications optionally contain a flag code for your own Capture-The-Flag events
- Interoperability: Integrate with your own training systems via WebHook, monitor the extensive metrics or consume challenge information directly via API or file import
- 2021-04-13T05:20:04Z: juice-shop
- 2021-04-11T19:38:45Z: juice-shop
- 2021-02-08T07:27:18Z: juice-shop
- 2021-02-07T18:03:09Z: juice-shop
- 2021-01-16T01:12:50Z: juice-shop
- 2020-12-30T11:58:19Z: juice-shop
- 2020-12-19T22:44:26Z: juice-shop
- 2020-12-11T15:34:34Z: juice-shop
- 2020-12-10T17:37:48Z: juice-shop
- 2021-04-12T21:28:53Z: juice-shop-ctf
- 2020-12-14T19:43:09Z: juice-shop-ctf
- 2020-10-11T21:21:47Z: juice-shop-ctf
- 2020-08-06T10:57:31Z: juice-shop-ctf
- 2020-05-03T08:25:23Z: juice-shop-ctf
The vulnerabilities found in the OWASP Juice Shop are categorized into several different classes. Most of them cover different risk or vulnerability types from well-known lists or documents, such as OWASP Top 10, OWASP ASVS, OWASP Automated Threat Handbook and OWASP API Security Top 10 or MITRE’s Common Weakness Enumeration.
|Broken Access Control||10||Admin Section, CSRF, Easter Egg, Five-Star Feedback, Forged Feedback, Forged Review, Manipulate Basket, Product Tampering, SSRF, View Basket|
|Broken Anti Automation||4||CAPTCHA Bypass, Extra Language, Multiple Likes, Reset Morty's Password|
|Broken Authentication||10||Bjoern's Favorite Pet, Change Bender's Password, GDPR Data Erasure, Login Bjoern, Login CISO, Password Strength, Reset Bender's Password, Reset Bjoern's Password, Reset Jim's Password, Two Factor Authentication|
|Cryptographic Issues||5||Forged Coupon, Imaginary Challenge, Nested Easter Egg, Premium Paywall, Weird Crypto|
|Improper Input Validation||10||Admin Registration, Deluxe Fraud, Expired Coupon, Missing Encoding, Payback Time, Poison Null Byte, Repetitive Registration, Upload Size, Upload Type, Zero Stars|
|Injection||11||Christmas Special, Database Schema, Ephemeral Accountant, Login Admin, Login Bender, Login Jim, NoSQL DoS, NoSQL Exfiltration, NoSQL Manipulation, SSTi, User Credentials|
|Insecure Deserialization||2||Blocked RCE DoS, Successful RCE DoS|
|Security Misconfiguration||4||Cross-Site Imaging, Deprecated Interface, Error Handling, Login Support Team|
|Sensitive Data Exposure||16||Access Log, Confidential Document, Email Leak, Exposed Metrics, Forgotten Developer Backup, Forgotten Sales Backup, GDPR Data Theft, Leaked Access Logs, Leaked Unsafe Product, Login Amy, Login MC SafeSearch, Meta Geo Stalking, Misplaced Signature File, Reset Uvogin's Password, Retrieve Blueprint, Visual Geo Stalking|
|Unvalidated Redirects||2||Allowlist Bypass, Outdated Allowlist|
|Vulnerable Components||8||Arbitrary File Write, Forged Signed JWT, Frontend Typosquatting, Kill Chatbot, Legacy Typosquatting, Supply Chain Attack, Unsigned JWT, Vulnerable Library|
|XSS||9||API-only XSS, Bonus Payload, CSP Bypass, Client-side XSS Protection, DOM XSS, HTTP-Header XSS, Reflected XSS, Server-side XSS Protection, Video XSS|
|XXE||2||XXE Data Access, XXE DoS|
Tags do not represent vulnerability categories but serve as additional meta information for challenges. They mark certain commonalities or special types of challenges - like those lacking seriousness or ones that probably need some scripting/automation etc.
|Brute Force||5||Bully Chatbot, CAPTCHA Bypass, Extra Language, Password Strength, Reset Morty's Password|
|Code Analysis||10||Blockchain Hype, Forged Coupon, Imaginary Challenge, Kill Chatbot, Login Bjoern, Login CISO, Outdated Allowlist, SSRF, SSTi, Score Board|
|Contraption||9||Blockchain Hype, Cross-Site Imaging, Deprecated Interface, Easter Egg, Forgotten Developer Backup, Forgotten Sales Backup, Login Support Team, Misplaced Signature File, SSTi|
|Danger Zone||15||API-only XSS, Arbitrary File Write, Blocked RCE DoS, CSP Bypass, Client-side XSS Protection, HTTP-Header XSS, NoSQL DoS, NoSQL Exfiltration, Reflected XSS, SSTi, Server-side XSS Protection, Successful RCE DoS, Video XSS, XXE Data Access, XXE DoS|
|OSINT||14||Bjoern's Favorite Pet, Leaked Access Logs, Leaked Unsafe Product, Login Amy, Login MC SafeSearch, Meta Geo Stalking, Reset Bender's Password, Reset Bjoern's Password, Reset Jim's Password, Reset Morty's Password, Reset Uvogin's Password, Supply Chain Attack, Visual Geo Stalking, Vulnerable Library|
|Prerequisite||6||Allowlist Bypass, Arbitrary File Write, Deprecated Interface, Error Handling, Forgotten Developer Backup, Poison Null Byte|
Hacking Instructor Tutorials
Click on a link in the table below to launch a step-by-step tutorial for that particular challenge on our public https://demo.owasp-juice.shop instance. If you are entirely new to the Juice Shop, we recommend doing them in the listed order. With the (optional) Tutorial Mode you can even enforce that the 10 tutorial challenges have to be performed gradually in order to unlock the other 90 challenges.
|Password Strength||Broken Authentication||⭐⭐|
|View Basket||Broken Access Control||⭐⭐|
|Forged Feedback||Broken Access Control||⭐⭐⭐|
The Node package
helps you to prepare
Capture the Flag
events with the OWASP Juice Shop challenges for different popular CTF
frameworks. This interactive utility allows you to populate a CTF game
server in a matter of minutes.
Supported CTF Frameworks
The following open source CTF frameworks are supported by
Official Companion Guide
Pwning OWASP Juice Shop is the official companion guide for this project. It will give you a complete overview of the vulnerabilities found in the application including hints how to spot and exploit them. In the appendix you will even find complete step-by-step solutions to every challenge.
The ebook is published under CC BY-NC-ND 4.0 and is online-readable for free at https://pwning.owasp-juice.shop. The latest officially released edition is also available for free at https://leanpub.com/juice-shop in PDF, Kindle and ePub format.
Endorsed Open Source Projects
|Multi User Juice Shop Platform to run separate Juice Shop instances for training or CTF participants on a central Kubernetes cluster|
|https://github.com/wurstbrot/shake-logger||Demo to show the dangers of XSS holes combined with bad Content Security Policy using Harlem Shake and a Keylogger against the Juice Shop (📺YouTube)|
The tools listed above are provided by third parties outside of the OWASP Juice Shop project scope. For support or feature requests please use the support channels or issue trackers mentioned by these projects.
You can attribute your donation to the OWASP Juice Shop project by using this link or the green “Donate”-button while on any tab of the Juice Shop project page!
In order to be recognized as a “Top Supporter” a company must have donated $1000 or more a) to OWASP while attributing it to Juice Shop or b) as a restricted gift to OWASP Juice Shop in the last 12 months.
All Corporate Supporters
- Wild West Hackin’ Fest(2020)
- Denim Group(2018-2019)
- New Work SE(2019)
All Individual Supporters
You want to appear on this list? Donate to OWASP here! 🤲
All Corporate-sponsored Code Contributions
In order to be recognized as a “Corporate-sponsored Code Contribution” an offical written confirmation of waiving all IP to the contributed code must be formally submitted to the OWASP Foundation.
$1,251.68 of royalties from Björn Kimminich’s eBook have been donated to the project between 09/2017 and 07/2019.
The OWASP Foundation is very grateful for the support by the individuals and organizations listed. However please note, the OWASP Foundation is strictly vendor neutral and does not endorse any of its supporters.