package servlets; import java.io.IOException; import java.math.BigInteger; import javax.servlet.ServletException; import javax.servlet.http.Cookie; import javax.servlet.http.HttpServlet; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import javax.servlet.http.HttpSession; import org.apache.log4j.Logger; import dbProcs.Getter; import dbProcs.Setter; import utils.ShepherdLogManager; import utils.Validate; /** * Control class for the Change Password function * <br/><br/> * This file is part of the Security Shepherd Project. * * The Security Shepherd project is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version.<br/> * * The Security Shepherd project is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details.<br/> * * You should have received a copy of the GNU General Public License * along with the Security Shepherd project. If not, see <http://www.gnu.org/licenses/>. * @author Mark Denihan * */ public class ChangePassword extends HttpServlet { private static final long serialVersionUID = 1L; private static org.apache.log4j.Logger log = Logger.getLogger(ChangePassword.class); /** * Initiated by index.jsp, getStarted.jsp. This changes a users password. If the user gets it wrong 3 times in a row, they'll be locked out (This is handed by database) * @param csrfToken * @param currentPassword User's current password * @param newPassword Submitted new password * @param passwordConfirmation Confirmation of the new password */ public void doPost (HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { //Setting IpAddress To Log and taking header for original IP if forwarded from proxy ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For")); log.debug("*** servlets.ChangePassword ***"); try { HttpSession ses = request.getSession(true); if(Validate.validateSession(ses)) { ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"), ses.getAttribute("userName").toString()); log.debug("Current User: " + ses.getAttribute("userName").toString()); Cookie tokenCookie = Validate.getToken(request.getCookies()); Object tokenParmeter = request.getParameter("csrfToken"); if(Validate.validateTokens(tokenCookie, tokenParmeter)) { log.debug("Getting Parameters"); String userName = (String) ses.getAttribute("userName"); String currentPassword = (String) request.getParameter("currentPassword"); String newPassword = (String) request.getParameter("newPassword"); String passwordConfirm = (String) request.getParameter("passwordConfirmation"); String ApplicationRoot = getServletContext().getRealPath(""); boolean validData = false; boolean passwordChange = false; boolean validPassword = false; validData = newPassword.equalsIgnoreCase(passwordConfirm) && !newPassword.isEmpty() && newPassword != null; passwordChange = !currentPassword.equalsIgnoreCase(newPassword); validPassword = newPassword.length() > 4 && newPassword.length() <= 512; if(validData && passwordChange && validPassword) { log.debug("Validating Current Password"); String user[] = Getter.authUser(ApplicationRoot, userName, currentPassword); if(user != null) { log.debug("User Credentials were good! Password Change gets the go ahead"); Setter.updatePassword(ApplicationRoot, userName, currentPassword, newPassword); ses.setAttribute("ChangePassword", "false"); } else { log.error("Incorrect Password"); ses.setAttribute("errorMessage", "Incorrect Password... Don't lock yourself out!"); response.sendRedirect("index.jsp"); } } else { if(validData && passwordChange) { try { //User Account is Locked log.debug("The user account is locked. Logging the user out"); Cookie cookieToken = Validate.getToken(request.getCookies()); BigInteger temp = new BigInteger(cookieToken.getValue()); response.sendRedirect("logout?csrfToken="+temp); } catch (Exception e) { log.error("Cant Log the user out because they dont have a valid CSRF token : " + e.toString()); response.sendRedirect("login.jsp"); } } //Return error message else if(!validData) { log.error("Bad Data Received"); ses.setAttribute("errorMessage", "Invalid Request! Please try again."); } else if(!validPassword) { log.error("Invalid Password Submitted (Too Short/Long)"); ses.setAttribute("errorMessage", "Invalid Password! Please try again."); } else { log.error("No password Change Detected"); ses.setAttribute("errorMessage", "You have to CHANGE your password! Please try again."); } } } else { log.error("CSRF Attack Detected"); } } else { log.error("Change Password Function Called with no valid session"); response.sendRedirect("login.jsp"); } } catch(Exception e) { log.fatal("ChangePassword Error: " + e.toString()); } log.debug("*** END ChangePassword ***"); response.sendRedirect("index.jsp"); } }