This repository shows exemplary how to set up a DevSecOps build chain which detects vulnerabilities in an application upon a commit / deployment.
DO NOT DEPLOY THE APPLICATION IN THIS REPOSITORY IF YOU DO NOT EXACTLY KNOW WHAT YOU ARE DOING
The enclosed application contains:
- Only an index page with a reflected XSS vulnerability
- A framework which contains vulnerabilities
This is a simple web application written with Django. It implements a single view which will return everything the user inputs. The templating engine disables the automatic XSS protection feature which sanitizes the input. In addition, the XSSDisableMiddleware disables the XSS protection feature implemented in modern web browser.
This application contains a build file for CircleCI to deploy the vulnerable application to Heroku. There are build jobs defined to do a dependency check for the python application using safety and a dynamic application security test using the Crashtest Security Suite.
This application is used within workshops hold by Crashtest Security. This tutorial contains the steps to follow the workshop. In case you want to attend one of those workshops, let us know via e-mail.
- GitHub: Create an account to get access to the source code of this example project
- CircleCI: Login using GitHub to grant CircleCI access to your GitHub projects
- Heroku: Create an account to deploy the example application there
- Crashtest Security: Create an account to conduct a dynamic vulnerability scan
To get access to the repository code, fork this repository by clicking the "Fork" button on the top right: https://github.com/crashtest-security/devsecops-example-heroku
This will create your own copy of the code repository and redirect you to the repository page.
- Create a new application within Heroku: https://dashboard.heroku.com/new-app. You may choose any name and region you like. Just remember the name of your new Heroku app. We will refer to the name of your Heroku app as
HEROKU_APP_NAME
. For this tutorial, I have named the applicationsigs-devsecops-example
- Go to the app settings, click on "Reveal Config Vars" and add a new environment variable
DISABLE_COLLECTSTATIC = 1
. This is needed for the Django application to run properly on heroku. If you miss to set this environment variable you will later see an error message during the corresponding build step. - When you click on "Open App", you should see a default page from Heroku that states that you have no application running yet.
- Retrieve your Heroku API key here: https://dashboard.heroku.com/account (At the bottom of the page). You need this API key to grant CircleCI access to deploy your application. We will refer to this variable as
HEROKU_API_KEY
.
-
Open the CircleCI dashboard: https://circleci.com/dashboard. When you get asked for login credentials, log in using your GitHub account. This grants CircleCI access permissions to get the code from your repository.
-
Add your GitHub Repository to CircleCI by clicking "Add Projects" in the left menu bar and then on "Set Up Project"
-
Open the newly added project (pipeline) and click on "Project Settings" on the top right
-
Choose "Environment variables" in the left menu bar
-
Configure the following two environment variables:
HEROKU_APP_NAME
- Enter the name that you previously choseHEROKU_API_KEY
- Enter the API Key as provided by Heroku
- To start a fresh build in CircleCI, we need to trigger a change in the repository. Therefore we add a submit button to the form in the application.
- In your GitHub repository navigate to
devsecops-example-heroku/vulnerable/templates/index.html
and click the pencil icon to edit the file. - Add a button to the form by adding the following code before the form closing tag (line 11).
<input type="submit" value="Send!" />
- When the file is saved, the change is commited to the repository and a new build is triggered in CircleCI automatically.
- The build deploys the application and you can now access it from Heroku by clicking the "Open App" button.
- You can see that the application contains a Cross-Site-Scripting vulnerability by typing the following as your name within the application. This will make the browser show an alert box as it is interpreting your provided JavaScript:
<script>alert("XSS")</script>
- To enable the dependency check of all python dependencies in the build, add the following lines at the end of the file
devsecops-example-heroku/.circleci/config.yml
(make sure that the indentation matches).
- sast
- The new build step must fail, as there are known vulnerabilities in the Django version used.
- To fix the build, figure out what the latest Django version is and update it in the file
devsecops-example-heroku/requirements.txt
. You can find the latest Django version here: https://www.djangoproject.com/download/
-
To integrate a dynamic vulnerability scan using the Crashtest Security Suite, log in on https://crashtest.cloud and create a new scan target with the following settings:
- Project Type: Multi Page Application
- Title: Choose a title you like
- Protocol: https
- URL: The URL that your application is running (Copy from your browser address bar after clicking on "Open App" in Heroku).
-
Click "Continue"
-
Choose the "Full Scan" scope to check for all possible vulnerabilities
-
Click "Create"
-
Click on "Verify Scan Target" to download the verification file. You need this file to allow the Crashtest Security Suite to scan your application.
- In GitHub within the root directory of your project click on "Create new file". Name the file similar to the downloaded verification file and fill it with the same content.
- Generate a Webhook within the Crashtest Security Suite. Go to the project preferences and click on "Generate" in the Webhook section
-
Add a new environment variable in the project settings in CircleCI:
CRASHTEST_WEBHOOK
- Enter the ID of the webhook that you just generated (without the URL path).
- Now enable the dynamic vulnerability scan for your application by adding the following lines at the end of the file
devsecops-example-heroku/.circleci/config.yml
(make sure that the indentation matches, the line "requires" has 4 additional whitespaces of indentation compared to the line before).
# Start Crashtest Security Suite
- dast:
requires:
- deploy
- Now the build fails because of several more detected vulnerabilities such as the Cross-Site-Scripting Vulnerability
- To resolve the Cross-Site-Scripting vulnerability open the file
devsecops-example-heroku/vulnerable/templates/index.html
and remove the pipe| safe
in line 4. - Now you should get a successful build again and have a much more secure application than before.