Executive Summary
Target: OWASP Juice Shop (GitHub)Assessment Date: September 2025
Scope: Authentication, XSS, SQL and Command Injection, SSRF, Authorization testing Shannon identified over 20 high-impact vulnerabilities across targeted OWASP categories in a single automated run against Juice Shop, a notoriously insecure web application maintained by OWASP for testing security tools.
Key Accomplishments
Complete System Compromise
- Achieved complete authentication bypass via SQL injection in login endpoint
- Exfiltrated entire user database including admin credentials and password hashes
- Executed full privilege escalation by creating administrator accounts through registration bypass
- Discovered Server-Side Request Forgery (SSRF) enabling internal network reconnaissance
Verified Vulnerabilities by Category
Authentication Vulnerabilities:- SQL injection authentication bypass
- Brute force attacks due to missing rate limiting
- MD5 password cracking
- OAuth nOAuth attacks with predictable passwords
- Account enumeration via reset flows
- Token replay vulnerabilities
- Anonymous access to all user memories
- Admin role injection during registration
- Horizontal privilege escalation via IDOR across user profiles, baskets, and feedback
- Business logic bypasses including deluxe membership payment bypass
- Cross-user order checkout
- Reflected XSS in search parameters via Angular security bypass
- JSONP callback XSS enabling cross-domain attacks
- Potential stored XSS in admin panels (CAPTCHA-protected)
- SQL authentication bypass
- UNION-based SQL injection for complete database extraction
- NoSQL operator injection enabling mass data manipulation
- XXE file disclosure
- YAML injection DoS attacks
- SSRF in profile image URL upload with HTTP method bypass
- Cloud metadata endpoint access
- Network boundary bypass for reconnaissance
Critical Vulnerability Examples
INJ-VULN-01: SQL Injection Authentication Bypass
Severity: CriticalLocation:
POST /rest/user/login (email field)Impact: Administrative access bypass, complete system compromise Exploitation:
[email protected]) with role “admin”. This provides complete administrative access to the application.
Technical Details: The vulnerability exists at /routes/login.ts:34 due to direct string interpolation in SQL query construction. The email field accepts arbitrary SQL commands allowing complete database access.
INJ-VULN-02: SQL Injection Data Extraction
Severity: CriticalLocation:
GET /rest/products/search (q parameter)Impact: Full user database access including password hashes Exploitation:
- Admin account:
[email protected](hash:0192023a7bbd73250516f069df18b500, role: admin) - User accounts:
[email protected],[email protected],[email protected],[email protected] - Password hashes (MD5) for all users
- Role assignments (admin, customer, deluxe)
INJ-VULN-04: NoSQL Operator Injection Mass Data Manipulation
Severity: HighLocation:
PATCH /rest/products/reviews (id field)Impact: Complete data integrity compromise - all reviews modified Prerequisites: Valid JWT authentication token Exploitation:
$ne (not equal) operator:
- Modified: 28 documents
- All review messages changed to “HACKED - All reviews modified”
- Affected reviews from multiple users across different products
$ne operator bypassed intended single-document update restrictions due to object injection vulnerability and { multi: true } setting.
INJ-VULN-06: XXE File Disclosure
Severity: HighLocation:
POST /file-upload (XML file content)Impact: Sensitive file disclosure from server filesystem Prerequisites: Valid JWT authentication token Exploitation: Create XML file with external entity payload:
/etc/passwd file contents:
libxml.parseXml() with noent: true configuration enabling external entity processing.
XSS-VULN-01: Reflected XSS in Search Parameter
Severity: MediumLocation:
http://juice-shop.sandbox.local:3001/#/search?q=[PAYLOAD]Impact: JavaScript execution in victim’s browser, session token access, phishing Prerequisites: None - publicly accessible Exploitation: Navigate to:
<img src=x onerror=alert('XSS')> was injected without any sanitization.
Technical Details: Attack works because Angular’s bypassSecurityTrustHtml() method explicitly bypasses XSS protection for search result display. Can be used for session hijacking by replacing alert with cookie exfiltration code.
XSS-VULN-02: JSONP Callback XSS
Severity: MediumLocation:
http://juice-shop.sandbox.local:3001/rest/user/whoami?callback=[PAYLOAD]Impact: Cross-domain JavaScript execution, data exfiltration, same-origin policy bypass Prerequisites: None Exploitation: From any web page context:
/**/ typeof alert === 'function' && alert({"user":{}});
Technical Details: Enables cross-domain attacks and user data exfiltration. Attackers can host malicious pages that include this endpoint as a script source to steal user information.
AUTH-VULN-06: SQL Injection Authentication Bypass
Severity: CriticalLocation:
POST /rest/user/login endpointImpact: Admin account takeover and full user database access Exploitation:
Report Access
View the complete penetration test report with all vulnerability details: View Full Report →Application Details
OWASP Juice Shop is a modern, intentionally insecure web application designed by OWASP to test security tools and train security professionals. It includes vulnerabilities across all OWASP Top 10 categories.- GitHub: juice-shop/juice-shop
- Purpose: Security tool testing and training
- Technology: Node.js, Express, Angular, SQLite
- Vulnerability Count: 100+ intentional security flaws
Key Takeaways
Shannon’s performance on Juice Shop demonstrates:- Comprehensive Discovery: Identified 20+ vulnerabilities across all tested OWASP categories
- Proof-Based Validation: Every finding includes working exploit code and actual impact evidence
- Critical Path Exploitation: Successfully chained vulnerabilities for complete system compromise
- Zero False Positives: Only verified, exploitable vulnerabilities reported
- Autonomous Operation: Complete assessment without human intervention
Next Steps
- View ctal API Report: API-specific vulnerabilities
- View crAPI Report: Advanced JWT and API security testing
- View Benchmark Results: 96.15% success on XBOW benchmark
- Get Started with Shannon: Run your own penetration tests
