package servlets.module.challenge;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.Locale;
import java.util.ResourceBundle;
import javax.servlet.ServletException;
import javax.servlet.http.Cookie;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import org.apache.commons.codec.binary.Base64;
import org.apache.log4j.Logger;
import dbProcs.Getter;
import utils.Hash;
import utils.ShepherdLogManager;
import utils.Validate;
/**
* Failure to Restrict URL Access 3
* <br/><br/>
* This file is part of the Security Shepherd Project.
*
* The Security Shepherd project is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.<br/>
*
* The Security Shepherd project is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.<br/>
*
* You should have received a copy of the GNU General Public License
* along with the Security Shepherd project. If not, see <http://www.gnu.org/licenses/>.
* @author Mark Denihan
*
*/
public class UrlAccess3 extends HttpServlet
{
private static final long serialVersionUID = 1L;
private static org.apache.log4j.Logger log = Logger.getLogger(UrlAccess3.class);
private static String levelName = "Failure to Restrict URL Access 3";
private static String levelHash = "e40333fc2c40b8e0169e433366350f55c77b82878329570efa894838980de5b4";
/**
* Users must take advance of the broken session management in this application by
* modifying the tracking cookie "currentPerson" which is encoded in Base64.
* They must modify this cookie to be equal a super admin to access the result key.
* @param userId Red herring that is pre set to d3d9446802a44259755d38e6d163e820
* @param secure Red herring that is pre set to true
* @param adminDetected Red herring
* @param currentPerson Cookie encoded base64 that manages who is signed in to the sub schema
*/
public void doPost (HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException
{
String redherringOne = new String("userId");
String redherringTwo = new String("secure");
//Translation Stuff
Locale locale = new Locale(Validate.validateLanguage(request.getSession()));
ResourceBundle errors = ResourceBundle.getBundle("i18n.servlets.errors", locale);
ResourceBundle bundle = ResourceBundle.getBundle("i18n.servlets.challenges.urlAccess.urlAccess3", locale);
PrintWriter out = response.getWriter();
out.print(getServletInfo());
try
{
//Setting IpAddress To Log and taking header for original IP if forwarded from proxy
ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"));
HttpSession ses = request.getSession(true);
if(Validate.validateSession(ses))
{
ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"), ses.getAttribute("userName").toString());
log.debug(levelName + " servlet accessed by: " + ses.getAttribute("userName").toString());
Cookie userCookies[] = request.getCookies();
int i = 0;
Cookie theCookie = null;
for(i = 0; i < userCookies.length; i++)
{
if(userCookies[i].getName().compareTo("currentPerson") == 0)
{
theCookie = userCookies[i];
break; //End Loop, because we found the token
}
}
String htmlOutput = null;
if(theCookie != null)
{
log.debug("Cookie value: " + theCookie.getValue());
if(theCookie.getValue().equals("TXJKb2huUmVpbGx5VGhlU2Vjb25k")) //If decodes to MrJohnReillyTheSecond
{
log.debug("Super Admin Cookie detected");
// Get key and add it to the output
String userKey = Hash.generateUserSolution(Getter.getModuleResultFromHash(getServletContext().getRealPath(""), levelHash), (String)ses.getAttribute("userName"));
htmlOutput = "<h2 class='title'>" + bundle.getString("admin.superAdminClub") + "</h2>" +
"<p>" +
bundle.getString("admin.superAdminClub.keyMessage") + " " +
"<a>" + userKey + "</a>" +
"</p>";
}
else if (!theCookie.getValue().equals("YUd1ZXN0")) //If Not "aGuest"
{
log.debug("Tampered role cookie detected: " + theCookie.getValue());
byte[] decodedCookieBytes = Base64.decodeBase64(theCookie.getValue());
String decodedCookie = new String(decodedCookieBytes, "UTF-8");
log.debug("Decoded Cookie: " + decodedCookie);
htmlOutput = "<!-- " + bundle.getString("response.invalidUser") + " -->";
}
else
{
log.debug("No change to role cookie submitted");
}
}
else
{
log.debug("No Role Cookie Submitted");
}
if(htmlOutput == null)
{
log.debug("Challenge Not Complete");
boolean hackDetected = false;
boolean badUserId = false;
hackDetected = !(request.getParameter(redherringOne) != null && request.getParameter(redherringTwo) != null);
if(!hackDetected)
{
String paramOne = request.getParameter(redherringOne).toString();
String paramTwo = request.getParameter(redherringTwo).toString();
log.debug("Param value of " + redherringOne + ":" + paramOne);
log.debug("Param value of " + redherringTwo + ":" + paramTwo);
badUserId = paramOne.equalsIgnoreCase("d3d9446802a44259755d38e6d163e820");
hackDetected = !badUserId && !paramTwo.equalsIgnoreCase("true");
}
if(!hackDetected)
{
htmlOutput = "<h2 class='title'>" + bundle.getString("response.notSuperAdmin") + "</h2>" +
"<p>" +
bundle.getString("response.notSuperAdmin.message") +
"</p>";
}
else
{
if(badUserId)
{
htmlOutput = "<h2 class='title'>" + bundle.getString("response.whoAreYou") + "</h2>" +
"<p>" +
bundle.getString("response.whoAreYou.message") +
"</p>";
}
else
{
htmlOutput = "<h2 class='title'>" + bundle.getString("response.hackDetected") + "</h2>" +
"<p>" +
bundle.getString("response.hackDetected.message") +
"</p>";
}
}
}
log.debug("Outputting HTML");
out.write(htmlOutput);
}
else
{
log.error(levelName + " servlet accessed with no session");
}
}
catch(Exception e)
{
out.write(errors.getString("error.funky"));
log.fatal(levelName + " - " + e.toString());
}
}
}