package servlets.module.challenge; import java.io.IOException; import java.io.PrintWriter; import java.sql.Connection; import java.sql.ResultSet; import java.sql.SQLException; import java.sql.Statement; import java.util.Locale; import java.util.ResourceBundle; import javax.servlet.ServletException; import javax.servlet.http.HttpServlet; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import javax.servlet.http.HttpSession; import org.apache.log4j.Logger; import org.owasp.esapi.ESAPI; import org.owasp.esapi.Encoder; import utils.ShepherdLogManager; import utils.SqlFilter; import utils.Validate; import dbProcs.Database; /** * SQL Injection Challenge Four - Does not use user specific key * <br/><br/> * This file is part of the Security Shepherd Project. * * The Security Shepherd project is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version.<br/> * * The Security Shepherd project is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details.<br/> * * You should have received a copy of the GNU General Public License * along with the Security Shepherd project. If not, see <http://www.gnu.org/licenses/>. * @author Mark Denihan * */ public class SqlInjection4 extends HttpServlet { //Sql Challenge 4 private static final long serialVersionUID = 1L; private static org.apache.log4j.Logger log = Logger.getLogger(SqlInjection4.class); private static String levelName = "SqlInjection4"; private static String levelResult = "d316e80045d50bdf8ed49d48f130b4acf4a878c82faef34daff8eb1b98763b6f"; public static String levelHash = "1feccf2205b4c5ddf743630b46aece3784d61adc56498f7603ccd7cb8ae92629"; /** * Users have to defeat SQL injection that blocks single quotes. * The input they enter is also been filtered. * @param theUserName User name used in database look up. * @param thePassword User password used in database look up */ public void doPost (HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { //Setting IpAddress To Log and taking header for original IP if forwarded from proxy ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For")); HttpSession ses = request.getSession(true); //Translation Stuff Locale locale = new Locale(Validate.validateLanguage(request.getSession())); ResourceBundle errors = ResourceBundle.getBundle("i18n.servlets.errors", locale); ResourceBundle bundle = ResourceBundle.getBundle("i18n.servlets.challenges.sqli.sqli4", locale); if(Validate.validateSession(ses)) { ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"), ses.getAttribute("userName").toString()); log.debug(levelName + " servlet accessed by: " + ses.getAttribute("userName").toString()); PrintWriter out = response.getWriter(); out.print(getServletInfo()); String htmlOutput = new String(); Encoder encoder = ESAPI.encoder(); try { String theUserName = request.getParameter("theUserName"); log.debug("User Submitted - " + theUserName); theUserName = SqlFilter.levelFour(theUserName); log.debug("Filtered to " + theUserName); String thePassword = request.getParameter("thePassword"); log.debug("thePassword Submitted - " + thePassword); thePassword = SqlFilter.levelFour(thePassword); log.debug("Filtered to " + thePassword); String ApplicationRoot = getServletContext().getRealPath(""); log.debug("Servlet root = " + ApplicationRoot ); log.debug("Getting Connection to Database"); Connection conn = Database.getChallengeConnection(ApplicationRoot, "SqlChallengeFour"); Statement stmt = conn.createStatement(); log.debug("Gathering result set"); ResultSet resultSet = stmt.executeQuery("SELECT userName FROM users WHERE userName = '" + theUserName + "' AND userPassword = '" + thePassword + "'"); int i = 0; htmlOutput = "<h2 class='title'>" + bundle.getString("response.loginResults")+ "</h2>"; log.debug("Opening Result Set from query"); if(resultSet.next()) { log.debug("Signed in as " + resultSet.getString(1)); htmlOutput += "<p>" + bundle.getString("response.signedInAs")+ "" + encoder.encodeForHTML(resultSet.getString(1)) + "</p>"; if(resultSet.getString(1).equalsIgnoreCase("admin")) { htmlOutput += "<p>" + bundle.getString("response.adminResultKey")+ "" + "<a>" + encoder.encodeForHTML(levelResult) + "</a>"; } else { htmlOutput += "<p>" + bundle.getString("response.adminsFun")+ "</p>"; } i++; } if(i == 0) { htmlOutput = "<h2 class='title'>" + bundle.getString("response.loginResults")+ "</h2><p>" + bundle.getString("response.superSecure")+ "</p>"; } } catch (SQLException e) { log.debug("SQL Error caught - " + e.toString()); htmlOutput += "<p>"+errors.getString("error.detected")+"</p>" + "<p>" + encoder.encodeForHTML(e.toString()) + "</p>"; } catch(Exception e) { out.write(errors.getString("error.funky")); log.fatal(levelName + " - " + e.toString()); } log.debug("Outputting HTML"); out.write(htmlOutput); } else { log.error(levelName + " servlet accessed with no session"); } } }