-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
- Loading branch information
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,83 @@ | ||
/** | ||
* OWASP Benchmark v1.2 | ||
* | ||
* <p>This file is part of the Open Web Application Security Project (OWASP) Benchmark Project. For | ||
* details, please see <a | ||
* href="https://owasp.org/www-project-benchmark/">https://owasp.org/www-project-benchmark/</a>. | ||
* | ||
* <p>The OWASP Benchmark is free software: you can redistribute it and/or modify it under the terms | ||
* of the GNU General Public License as published by the Free Software Foundation, version 2. | ||
* | ||
* <p>The OWASP Benchmark is distributed in the hope that it will be useful, but WITHOUT ANY | ||
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR | ||
* PURPOSE. See the GNU General Public License for more details. | ||
* | ||
* @author Dave Wichers | ||
* @created 2015 | ||
*/ | ||
package org.owasp.benchmark.testcode; | ||
|
||
import java.io.IOException; | ||
import javax.servlet.ServletException; | ||
import javax.servlet.annotation.WebServlet; | ||
import javax.servlet.http.HttpServlet; | ||
import javax.servlet.http.HttpServletRequest; | ||
import javax.servlet.http.HttpServletResponse; | ||
|
||
@WebServlet(value = "/securecookie-00/BenchmarkTest00016") | ||
public class BenchmarkTest00016 extends HttpServlet { | ||
|
||
private static final long serialVersionUID = 1L; | ||
|
||
@Override | ||
public void doGet(HttpServletRequest request, HttpServletResponse response) | ||
throws ServletException, IOException { | ||
doPost(request, response); | ||
} | ||
|
||
@Override | ||
public void doPost(HttpServletRequest request, HttpServletResponse response) | ||
throws ServletException, IOException { | ||
// some code | ||
response.setContentType("text/html;charset=UTF-8"); | ||
|
||
String param = ""; | ||
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00016"); | ||
|
||
if (headers != null && headers.hasMoreElements()) { | ||
param = headers.nextElement(); // just grab first element | ||
} | ||
|
||
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters(). | ||
param = java.net.URLDecoder.decode(param, "UTF-8"); | ||
|
||
byte[] input = new byte[1000]; | ||
String str = "?"; | ||
Object inputParam = param; | ||
if (inputParam instanceof String) str = ((String) inputParam); | ||
if (inputParam instanceof java.io.InputStream) { | ||
int i = ((java.io.InputStream) inputParam).read(input); | ||
if (i == -1) { | ||
response.getWriter() | ||
.println( | ||
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source."); | ||
return; | ||
} | ||
str = new String(input, 0, i); | ||
} | ||
if ("".equals(str)) str = "No cookie value supplied"; | ||
javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str); | ||
|
||
cookie.setSecure(true); | ||
cookie.setHttpOnly(true); | ||
cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet | ||
// e.g., /benchmark/sql-01/BenchmarkTest01001 | ||
response.addCookie(cookie); | ||
Check warning Code scanning / CodeQL HTTP response splitting Medium test
This header depends on a
user-provided value Error loading related location Loading |
||
|
||
response.getWriter() | ||
.println( | ||
"Created cookie: 'SomeCookie': with value: '" | ||
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(str) | ||
+ "' and secure flag set to: true"); | ||
Check warning Code scanning / CodeQL Cross-site scripting Medium test
Cross-site scripting vulnerability due to a
user-provided value Error loading related location Loading |
||
} | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,72 @@ | ||
/** | ||
* OWASP Benchmark v1.2 | ||
* | ||
* <p>This file is part of the Open Web Application Security Project (OWASP) Benchmark Project. For | ||
* details, please see <a | ||
* href="https://owasp.org/www-project-benchmark/">https://owasp.org/www-project-benchmark/</a>. | ||
* | ||
* <p>The OWASP Benchmark is free software: you can redistribute it and/or modify it under the terms | ||
* of the GNU General Public License as published by the Free Software Foundation, version 2. | ||
* | ||
* <p>The OWASP Benchmark is distributed in the hope that it will be useful, but WITHOUT ANY | ||
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR | ||
* PURPOSE. See the GNU General Public License for more details. | ||
* | ||
* @author Dave Wichers | ||
* @created 2015 | ||
*/ | ||
package org.owasp.benchmark.testcode; | ||
|
||
import java.io.IOException; | ||
import javax.servlet.ServletException; | ||
import javax.servlet.annotation.WebServlet; | ||
import javax.servlet.http.HttpServlet; | ||
import javax.servlet.http.HttpServletRequest; | ||
import javax.servlet.http.HttpServletResponse; | ||
|
||
@WebServlet(value = "/cmdi-00/BenchmarkTest00017") | ||
public class BenchmarkTest00017 extends HttpServlet { | ||
|
||
private static final long serialVersionUID = 1L; | ||
|
||
@Override | ||
public void doGet(HttpServletRequest request, HttpServletResponse response) | ||
throws ServletException, IOException { | ||
doPost(request, response); | ||
} | ||
|
||
@Override | ||
public void doPost(HttpServletRequest request, HttpServletResponse response) | ||
throws ServletException, IOException { | ||
// some code | ||
response.setContentType("text/html;charset=UTF-8"); | ||
|
||
String param = ""; | ||
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00017"); | ||
|
||
if (headers != null && headers.hasMoreElements()) { | ||
param = headers.nextElement(); // just grab first element | ||
} | ||
|
||
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters(). | ||
param = java.net.URLDecoder.decode(param, "UTF-8"); | ||
|
||
String cmd = ""; | ||
String osName = System.getProperty("os.name"); | ||
if (osName.indexOf("Windows") != -1) { | ||
cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("echo"); | ||
} | ||
|
||
Runtime r = Runtime.getRuntime(); | ||
|
||
try { | ||
Process p = r.exec(cmd + param); | ||
Check failure Code scanning / CodeQL Uncontrolled command line Critical test
This command line depends on a
user-provided value Error loading related location Loading |
||
org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response); | ||
} catch (IOException e) { | ||
System.out.println("Problem executing cmdi - TestCase"); | ||
response.getWriter() | ||
.println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage())); | ||
Check warning Code scanning / CodeQL Information exposure through a stack trace Medium test Error information Error loading related location Loading |
||
return; | ||
} | ||
} | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
/** | ||
* OWASP Benchmark v1.2 | ||
* | ||
* <p>This file is part of the Open Web Application Security Project (OWASP) Benchmark Project. For | ||
* details, please see <a | ||
* href="https://owasp.org/www-project-benchmark/">https://owasp.org/www-project-benchmark/</a>. | ||
* | ||
* <p>The OWASP Benchmark is free software: you can redistribute it and/or modify it under the terms | ||
* of the GNU General Public License as published by the Free Software Foundation, version 2. | ||
* | ||
* <p>The OWASP Benchmark is distributed in the hope that it will be useful, but WITHOUT ANY | ||
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR | ||
* PURPOSE. See the GNU General Public License for more details. | ||
* | ||
* @author Dave Wichers | ||
* @created 2015 | ||
*/ | ||
package org.owasp.benchmark.testcode; | ||
|
||
import java.io.IOException; | ||
import javax.servlet.ServletException; | ||
import javax.servlet.annotation.WebServlet; | ||
import javax.servlet.http.HttpServlet; | ||
import javax.servlet.http.HttpServletRequest; | ||
import javax.servlet.http.HttpServletResponse; | ||
|
||
@WebServlet(value = "/sqli-00/BenchmarkTest00018") | ||
public class BenchmarkTest00018 extends HttpServlet { | ||
|
||
private static final long serialVersionUID = 1L; | ||
|
||
@Override | ||
public void doGet(HttpServletRequest request, HttpServletResponse response) | ||
throws ServletException, IOException { | ||
doPost(request, response); | ||
} | ||
|
||
@Override | ||
public void doPost(HttpServletRequest request, HttpServletResponse response) | ||
throws ServletException, IOException { | ||
// some code | ||
response.setContentType("text/html;charset=UTF-8"); | ||
|
||
String param = ""; | ||
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00018"); | ||
|
||
if (headers != null && headers.hasMoreElements()) { | ||
param = headers.nextElement(); // just grab first element | ||
} | ||
|
||
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters(). | ||
param = java.net.URLDecoder.decode(param, "UTF-8"); | ||
|
||
String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')"; | ||
|
||
try { | ||
java.sql.Statement statement = | ||
org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement(); | ||
int count = statement.executeUpdate(sql); | ||
Check failure Code scanning / CodeQL Query built from user-controlled sources High test
This query depends on a
user-provided value Error loading related location Loading |
||
org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response); | ||
} catch (java.sql.SQLException e) { | ||
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) { | ||
response.getWriter().println("Error processing request."); | ||
return; | ||
} else throw new ServletException(e); | ||
} | ||
} | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,107 @@ | ||
/** | ||
* OWASP Benchmark v1.2 | ||
* | ||
* <p>This file is part of the Open Web Application Security Project (OWASP) Benchmark Project. For | ||
* details, please see <a | ||
* href="https://owasp.org/www-project-benchmark/">https://owasp.org/www-project-benchmark/</a>. | ||
* | ||
* <p>The OWASP Benchmark is free software: you can redistribute it and/or modify it under the terms | ||
* of the GNU General Public License as published by the Free Software Foundation, version 2. | ||
* | ||
* <p>The OWASP Benchmark is distributed in the hope that it will be useful, but WITHOUT ANY | ||
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR | ||
* PURPOSE. See the GNU General Public License for more details. | ||
* | ||
* @author Dave Wichers | ||
* @created 2015 | ||
*/ | ||
package org.owasp.benchmark.testcode; | ||
|
||
import java.io.IOException; | ||
import javax.servlet.ServletException; | ||
import javax.servlet.annotation.WebServlet; | ||
import javax.servlet.http.HttpServlet; | ||
import javax.servlet.http.HttpServletRequest; | ||
import javax.servlet.http.HttpServletResponse; | ||
|
||
@WebServlet(value = "/crypto-00/BenchmarkTest00019") | ||
public class BenchmarkTest00019 extends HttpServlet { | ||
|
||
private static final long serialVersionUID = 1L; | ||
|
||
@Override | ||
public void doGet(HttpServletRequest request, HttpServletResponse response) | ||
throws ServletException, IOException { | ||
doPost(request, response); | ||
} | ||
|
||
@Override | ||
public void doPost(HttpServletRequest request, HttpServletResponse response) | ||
throws ServletException, IOException { | ||
// some code | ||
response.setContentType("text/html;charset=UTF-8"); | ||
|
||
java.io.InputStream param = request.getInputStream(); | ||
|
||
try { | ||
java.util.Properties benchmarkprops = new java.util.Properties(); | ||
benchmarkprops.load( | ||
this.getClass().getClassLoader().getResourceAsStream("benchmark.properties")); | ||
String algorithm = benchmarkprops.getProperty("cryptoAlg1", "DESede/ECB/PKCS5Padding"); | ||
javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm); | ||
Check failure Code scanning / CodeQL Use of a broken or risky cryptographic algorithm High test
Cryptographic algorithm
DESede/ECB/PKCS5Padding Error loading related location Loading |
||
|
||
// Prepare the cipher to encrypt | ||
javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey(); | ||
Check failure Code scanning / CodeQL Use of a broken or risky cryptographic algorithm High test
Cryptographic algorithm
DES Error loading related location Loading |
||
c.init(javax.crypto.Cipher.ENCRYPT_MODE, key); | ||
|
||
// encrypt and store the results | ||
byte[] input = {(byte) '?'}; | ||
Object inputParam = param; | ||
if (inputParam instanceof String) input = ((String) inputParam).getBytes(); | ||
if (inputParam instanceof java.io.InputStream) { | ||
byte[] strInput = new byte[1000]; | ||
int i = ((java.io.InputStream) inputParam).read(strInput); | ||
if (i == -1) { | ||
response.getWriter() | ||
.println( | ||
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source."); | ||
return; | ||
} | ||
input = java.util.Arrays.copyOf(strInput, i); | ||
} | ||
byte[] result = c.doFinal(input); | ||
|
||
java.io.File fileTarget = | ||
new java.io.File( | ||
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR), | ||
"passwordFile.txt"); | ||
java.io.FileWriter fw = | ||
new java.io.FileWriter(fileTarget, true); // the true will append the new data | ||
fw.write( | ||
"secret_value=" | ||
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true) | ||
+ "\n"); | ||
fw.close(); | ||
response.getWriter() | ||
.println( | ||
"Sensitive value: '" | ||
+ org.owasp | ||
.esapi | ||
.ESAPI | ||
.encoder() | ||
.encodeForHTML(new String(input)) | ||
+ "' encrypted and stored<br/>"); | ||
|
||
} catch (java.security.NoSuchAlgorithmException | ||
| javax.crypto.NoSuchPaddingException | ||
| javax.crypto.IllegalBlockSizeException | ||
| javax.crypto.BadPaddingException | ||
| java.security.InvalidKeyException e) { | ||
response.getWriter() | ||
.println( | ||
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case"); | ||
e.printStackTrace(response.getWriter()); | ||
Check warning Code scanning / CodeQL Information exposure through a stack trace Medium test Error information Error loading related location Loading |
||
throw new ServletException(e); | ||
} | ||
} | ||
} |