Simple flask application to implement an intentionally vulnerable web app to demo CVE-2023-2822.# CVE-2023-2822-demo
Simple flask application to implement an intentionally vulnerable web app to demo CVE-2023-2822.
Based on the writeup at https://medium.com/@cyberninja717/reflected-cross-site-scripting-vulnerability-in-ellucian-ethos-identity-cas-logout-page-685bb1675dfb.
```
docker build -t xss-demo .
docker run -p <host_port>:5000 xss-demo
```
🤖 AIL LEVEL: This flask app's AI Influence Level is AIL4.
- [The AIL Rating System](https://danielmiessler.com/blog/ai-influence-level-ail/)
- See [how this code was written](https://chat.openai.com/share/d5a85160-24d4-4451-b8c1-148fdca14a18)
[4.0K] /data/pocs/3e9f4738b92a902e850a6c7c1b2b28e7cad2c636
├── [ 429] app.py
├── [ 104] Dockerfile
├── [ 603] README.md
├── [4.0K] static
│ └── [ 325] style.css
└── [4.0K] templates
├── [ 315] 403.html
├── [ 338] home.html
└── [ 348] logout.html
2 directories, 7 files