package servlets.module.challenge; import java.io.IOException; import java.io.PrintWriter; import java.util.Locale; import java.util.Random; import java.util.ResourceBundle; import javax.servlet.ServletException; import javax.servlet.http.HttpServlet; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import javax.servlet.http.HttpSession; import org.apache.log4j.Logger; import utils.ShepherdLogManager; import utils.Validate; import dbProcs.Getter; import dbProcs.Setter; /** * Cross Site Request Forgery Challenge Target Six * <br/><br/> * Weak Nonce Variety can be broken * <br/><br/> * This file is part of the Security Shepherd Project. * * The Security Shepherd project is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version.<br/> * * The Security Shepherd project is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details.<br/> * * You should have received a copy of the GNU General Public License * along with the Security Shepherd project. If not, see <http://www.gnu.org/licenses/>. * @author Mark Denihan * */ public class CsrfChallengeTargetSix extends HttpServlet { private static final long serialVersionUID = 1L; private static String moduleHash = "2fff41105149e507c75b5a54e558470469d7024929cf78d570cd16c03bee3569"; private static final String[] csrfArray ={"c4ca4238a0b923820dcc509a6f75849b", "c81e728d9d4c2f636f067f89cc14862c", "eccbc87e4b5ce2fe28308fd9f2a7baf3"}; private static org.apache.log4j.Logger log = Logger.getLogger(CsrfChallengeTargetSix.class); private static String levelName = "CSRF 6 Target"; /** * CSRF vulnerable function that can be used by users to force other users to mark their CSRF challenge Two as complete. * @param userId User identifier to be incremented */ public void doPost (HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { //Setting IpAddress To Log and taking header for original IP if forwarded from proxy ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For")); log.debug(levelName + " Servlet"); //Translation Stuff Locale locale = new Locale(Validate.validateLanguage(request.getSession())); ResourceBundle errors = ResourceBundle.getBundle("i18n.servlets.errors", locale); ResourceBundle csrfGenerics = ResourceBundle.getBundle("i18n.servlets.challenges.csrf.csrfGenerics", locale); PrintWriter out = response.getWriter(); out.print(getServletInfo()); String storedToken = new String(); try { String csrfTokenName = "csrfChallengeSixNonce"; boolean result = false; HttpSession ses = request.getSession(true); if(Validate.validateSession(ses)) { ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"), ses.getAttribute("userName").toString()); log.debug(levelName + " servlet accessed by: " + ses.getAttribute("userName").toString()); //Get CSRF Token From session if(ses.getAttribute(csrfTokenName) == null || ses.getAttribute(csrfTokenName).toString().isEmpty()) { log.debug("No CSRF Token associated with user"); Random random = new Random(); int newToken = random.nextInt(3); storedToken = csrfArray[newToken]; out.write(csrfGenerics.getString("target.noTokenNewToken") + " " + storedToken + "<br><br>"); ses.setAttribute(csrfTokenName, storedToken); } else { storedToken = "" + ses.getAttribute(csrfTokenName); } String userId = (String)ses.getAttribute("userStamp"); String plusId = request.getParameter("userId").trim();; log.debug("User Submitted - " + plusId); String csrfToken = request.getParameter("csrfToken").trim();; log.debug("csrfToken Submitted - " + csrfToken); if(!userId.equals(plusId)) { if(csrfToken.equalsIgnoreCase(storedToken)) { log.debug("Valid Nonce Value Submitted"); String ApplicationRoot = getServletContext().getRealPath(""); String userName = (String)ses.getAttribute("userName"); String attackerName = Getter.getUserName(ApplicationRoot, plusId); if(attackerName != null) { log.debug(userName + " is been CSRF'd by " + attackerName); log.debug("Attempting to Increment "); String moduleId = Getter.getModuleIdFromHash(ApplicationRoot, moduleHash); result = Setter.updateCsrfCounter(ApplicationRoot, moduleId, plusId); } else { log.error("UserId '" + plusId + "' could not be found."); } } else { log.debug("User " + plusId + " CSRF attack failed due to invalid nonce"); } } else { log.debug("User " + userId + " is attacking themselves"); } if(result) { out.write(csrfGenerics.getString("target.incrementSuccess")); } else { out.write(csrfGenerics.getString("target.incrementFailed")); } } else { out.write(csrfGenerics.getString("target.noSession")); } } catch(Exception e) { out.write(errors.getString("error.funky")); log.fatal(levelName + " - " + e.toString()); } } }