This is a clone of EasyBuggy built on Spring Boot. EasyBuggy is a broken web application in order to understand behavior of bugs and vulnerabilities, for example, memory leak, deadlock, JVM crash, SQL injection and so on.
When running EasyBuggy Boot with Keycloak, MySQL, and an attacker's application
$ echo HOST=192.168.1.17 > .env # if you run EasyBuggy Boot not on localhost (e.g. 192.168.1.17)
$ echo TZ=America/New_York >> .env # Added to eliminate container time skew
$ docker compose up
Access to
http://192.168.1.17
When running EasyBuggy Boot alone (fewer vulnerabilities than docker compose up)
$ mvn spring-boot:run
( or java -jar ROOT.war or deploy ROOT.war on your servlet container with the JVM options. )
Access to
http://localhost
Use CTRL+C
See the wiki page.
When you start with Docker Compose, the following containers will be started:
