package servlets.module.challenge;
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.ResultSet;
import java.sql.SQLException;
import java.sql.Statement;
import java.util.Locale;
import java.util.ResourceBundle;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import org.apache.log4j.Logger;
import org.owasp.esapi.ESAPI;
import org.owasp.esapi.Encoder;
import utils.ShepherdLogManager;
import utils.SqlFilter;
import utils.Validate;
import dbProcs.Database;
/**
* SQL Injection Challenge Four - Does not use user specific key
* <br/><br/>
* This file is part of the Security Shepherd Project.
*
* The Security Shepherd project is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.<br/>
*
* The Security Shepherd project is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.<br/>
*
* You should have received a copy of the GNU General Public License
* along with the Security Shepherd project. If not, see <http://www.gnu.org/licenses/>.
* @author Mark Denihan
*
*/
public class SqlInjection4 extends HttpServlet
{
//Sql Challenge 4
private static final long serialVersionUID = 1L;
private static org.apache.log4j.Logger log = Logger.getLogger(SqlInjection4.class);
private static String levelName = "SqlInjection4";
private static String levelResult = "d316e80045d50bdf8ed49d48f130b4acf4a878c82faef34daff8eb1b98763b6f";
public static String levelHash = "1feccf2205b4c5ddf743630b46aece3784d61adc56498f7603ccd7cb8ae92629";
/**
* Users have to defeat SQL injection that blocks single quotes.
* The input they enter is also been filtered.
* @param theUserName User name used in database look up.
* @param thePassword User password used in database look up
*/
public void doPost (HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException
{
//Setting IpAddress To Log and taking header for original IP if forwarded from proxy
ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"));
HttpSession ses = request.getSession(true);
//Translation Stuff
Locale locale = new Locale(Validate.validateLanguage(request.getSession()));
ResourceBundle errors = ResourceBundle.getBundle("i18n.servlets.errors", locale);
ResourceBundle bundle = ResourceBundle.getBundle("i18n.servlets.challenges.sqli.sqli4", locale);
if(Validate.validateSession(ses))
{
ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"), ses.getAttribute("userName").toString());
log.debug(levelName + " servlet accessed by: " + ses.getAttribute("userName").toString());
PrintWriter out = response.getWriter();
out.print(getServletInfo());
String htmlOutput = new String();
Encoder encoder = ESAPI.encoder();
try
{
String theUserName = request.getParameter("theUserName");
log.debug("User Submitted - " + theUserName);
theUserName = SqlFilter.levelFour(theUserName);
log.debug("Filtered to " + theUserName);
String thePassword = request.getParameter("thePassword");
log.debug("thePassword Submitted - " + thePassword);
thePassword = SqlFilter.levelFour(thePassword);
log.debug("Filtered to " + thePassword);
String ApplicationRoot = getServletContext().getRealPath("");
log.debug("Servlet root = " + ApplicationRoot );
log.debug("Getting Connection to Database");
Connection conn = Database.getChallengeConnection(ApplicationRoot, "SqlChallengeFour");
Statement stmt = conn.createStatement();
log.debug("Gathering result set");
ResultSet resultSet = stmt.executeQuery("SELECT userName FROM users WHERE userName = '" + theUserName + "' AND userPassword = '" + thePassword + "'");
int i = 0;
htmlOutput = "<h2 class='title'>" + bundle.getString("response.loginResults")+ "</h2>";
log.debug("Opening Result Set from query");
if(resultSet.next())
{
log.debug("Signed in as " + resultSet.getString(1));
htmlOutput += "<p>" + bundle.getString("response.signedInAs")+ "" + encoder.encodeForHTML(resultSet.getString(1)) + "</p>";
if(resultSet.getString(1).equalsIgnoreCase("admin"))
{
htmlOutput += "<p>" + bundle.getString("response.adminResultKey")+ ""
+ "<a>" + encoder.encodeForHTML(levelResult) + "</a>";
}
else
{
htmlOutput += "<p>" + bundle.getString("response.adminsFun")+ "</p>";
}
i++;
}
if(i == 0)
{
htmlOutput = "<h2 class='title'>" + bundle.getString("response.loginResults")+ "</h2><p>" + bundle.getString("response.superSecure")+ "</p>";
}
}
catch (SQLException e)
{
log.debug("SQL Error caught - " + e.toString());
htmlOutput += "<p>"+errors.getString("error.detected")+"</p>" +
"<p>" + encoder.encodeForHTML(e.toString()) + "</p>";
}
catch(Exception e)
{
out.write(errors.getString("error.funky"));
log.fatal(levelName + " - " + e.toString());
}
log.debug("Outputting HTML");
out.write(htmlOutput);
}
else
{
log.error(levelName + " servlet accessed with no session");
}
}
}