forked from WebGoat/WebGoat
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
11 changed files
with
252 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" | ||
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd"> | ||
<modelVersion>4.0.0</modelVersion> | ||
<artifactId>insecure-deserialization</artifactId> | ||
<packaging>jar</packaging> | ||
<parent> | ||
<groupId>org.owasp.webgoat.lesson</groupId> | ||
<artifactId>webgoat-lessons-parent</artifactId> | ||
<version>8.0.0.M3</version> | ||
</parent> | ||
|
||
<dependencies> | ||
<dependency> | ||
<groupId>org.springframework.boot</groupId> | ||
<artifactId>spring-boot-starter-test</artifactId> | ||
<scope>test</scope> | ||
</dependency> | ||
<dependency> | ||
<groupId>org.springframework.security</groupId> | ||
<artifactId>spring-security-test</artifactId> | ||
<version>4.1.3.RELEASE</version> | ||
<scope>test</scope> | ||
</dependency> | ||
<dependency> | ||
<groupId>junit</groupId> | ||
<artifactId>junit</artifactId> | ||
<version>${junit.version}</version> | ||
<type>jar</type> | ||
<scope>test</scope> | ||
</dependency> | ||
|
||
</dependencies> | ||
|
||
</project> |
63 changes: 63 additions & 0 deletions
63
...ecure-deserialization/src/main/java/org/owasp/webgoat/plugin/InsecureDeserialization.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,63 @@ | ||
package org.owasp.webgoat.plugin; | ||
|
||
import com.beust.jcommander.internal.Lists; | ||
import org.owasp.webgoat.lessons.Category; | ||
import org.owasp.webgoat.lessons.NewLesson; | ||
|
||
import java.util.List; | ||
|
||
/** | ||
* ************************************************************************************************ | ||
* This file is part of WebGoat, an Open Web Application Security Project utility. For details, | ||
* please see http://www.owasp.org/ | ||
* <p> | ||
* Copyright (c) 2002 - 20014 Bruce Mayhew | ||
* <p> | ||
* This program is free software; you can redistribute it and/or modify it under the terms of the | ||
* GNU General Public License as published by the Free Software Foundation; either version 2 of the | ||
* License, or (at your option) any later version. | ||
* <p> | ||
* This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without | ||
* even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
* General Public License for more details. | ||
* <p> | ||
* You should have received a copy of the GNU General Public License along with this program; if | ||
* not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA | ||
* 02111-1307, USA. | ||
* <p> | ||
* Getting Source ============== | ||
* <p> | ||
* Source for this application is maintained at https://github.com/WebGoat/WebGoat, a repository for free software | ||
* projects. | ||
* <p> | ||
* | ||
* @author WebGoat | ||
* @version $Id: $Id | ||
* @since October 12, 2016 | ||
*/ | ||
public class InsecureDeserialization extends NewLesson { | ||
@Override | ||
public Category getDefaultCategory() { | ||
return Category.INSECURE_DESERIALIZATION; | ||
} | ||
|
||
@Override | ||
public List<String> getHints() { | ||
return Lists.newArrayList(); | ||
} | ||
|
||
@Override | ||
public Integer getDefaultRanking() { | ||
return 1; | ||
} | ||
|
||
@Override | ||
public String getTitle() { | ||
return "insecure-deserialization.title"; | ||
} | ||
|
||
@Override | ||
public String getId() { | ||
return "InsecureDeserialization"; | ||
} | ||
} |
90 changes: 90 additions & 0 deletions
90
...e-deserialization/src/main/java/org/owasp/webgoat/plugin/InsecureDeserializationTask.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,90 @@ | ||
package org.owasp.webgoat.plugin; | ||
|
||
import org.owasp.webgoat.assignments.AssignmentEndpoint; | ||
import org.owasp.webgoat.assignments.AssignmentPath; | ||
import org.owasp.webgoat.assignments.AttackResult; | ||
import org.springframework.web.bind.annotation.RequestMapping; | ||
import org.springframework.web.bind.annotation.RequestMethod; | ||
import org.springframework.web.bind.annotation.RequestParam; | ||
import org.springframework.web.bind.annotation.ResponseBody; | ||
|
||
import javax.servlet.http.HttpServletRequest; | ||
import java.io.IOException; | ||
import java.io.ObjectInputStream; | ||
import java.io.ByteArrayInputStream; | ||
import java.util.Base64; | ||
|
||
/** | ||
* ************************************************************************************************* | ||
* | ||
* | ||
* This file is part of WebGoat, an Open Web Application Security Project | ||
* utility. For details, please see http://www.owasp.org/ | ||
* | ||
* Copyright (c) 2002 - 20014 Bruce Mayhew | ||
* | ||
* This program is free software; you can redistribute it and/or modify it under | ||
* the terms of the GNU General Public License as published by the Free Software | ||
* Foundation; either version 2 of the License, or (at your option) any later | ||
* version. | ||
* | ||
* This program is distributed in the hope that it will be useful, but WITHOUT | ||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS | ||
* FOR A PARTICULAR PURPOSE. See the GNU General Public License for more | ||
* details. | ||
* | ||
* You should have received a copy of the GNU General Public License along with | ||
* this program; if not, write to the Free Software Foundation, Inc., 59 Temple | ||
* Place - Suite 330, Boston, MA 02111-1307, USA. | ||
* | ||
* Getting Source ============== | ||
* | ||
* Source for this application is maintained at https://github.com/WebGoat/WebGoat, a repository | ||
* for free software projects. | ||
* | ||
* For details, please see http://webgoat.github.io | ||
* | ||
* @author Bruce Mayhew <a href="http://code.google.com/p/webgoat">WebGoat</a> | ||
* @created October 28, 2003 | ||
*/ | ||
@AssignmentPath("/InsecureDeserialization/task") | ||
public class InsecureDeserializationTask extends AssignmentEndpoint { | ||
|
||
@RequestMapping(method = RequestMethod.POST) | ||
public | ||
@ResponseBody | ||
AttackResult completed(@RequestParam String token) throws IOException { | ||
String b64token; | ||
byte [] data; | ||
ObjectInputStream ois; | ||
Object o; | ||
long before, after; | ||
int delay; | ||
|
||
b64token = token.replace('-', '+').replace('_', '/'); | ||
try { | ||
data = Base64.getDecoder().decode(b64token); | ||
ois = new ObjectInputStream( new ByteArrayInputStream(data) ); | ||
} catch (Exception e) { | ||
return trackProgress(failed().build()); | ||
} | ||
|
||
before = System.currentTimeMillis(); | ||
try { | ||
o = ois.readObject(); | ||
} catch (Exception e) { | ||
o = null; | ||
} | ||
after = System.currentTimeMillis(); | ||
ois.close(); | ||
|
||
delay = (int)(after - before); | ||
if ( delay > 7000 ) { | ||
return trackProgress(failed().build()); | ||
} | ||
if ( delay < 3000 ) { | ||
return trackProgress(failed().build()); | ||
} | ||
return trackProgress(success().build()); | ||
} | ||
} |
32 changes: 32 additions & 0 deletions
32
...oat-lessons/insecure-deserialization/src/main/resources/html/InsecureDeserialization.html
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
<!DOCTYPE html> | ||
|
||
<html xmlns:th="http://www.thymeleaf.org"> | ||
|
||
<div class="lesson-page-wrapper"> | ||
<!-- reuse this lesson-page-wrapper block for each 'page' of content in your lesson --> | ||
<!-- include content here. Content will be presented via asciidocs files, | ||
which you put in src/main/resources/plugin/lessonplans/{lang}/{fileName}.adoc --> | ||
<div class="adoc-content" th:replace="doc:InsecureDeserialization_Intro.adoc"></div> | ||
</div> | ||
|
||
<div class="lesson-page-wrapper"> | ||
<!-- stripped down without extra comments --> | ||
<div class="adoc-content" th:replace="doc:InsecureDeserialization_Task.adoc"></div> | ||
<div class="attack-container"> | ||
<div class="assignment-success"><i class="fa fa-2 fa-check hidden" aria-hidden="true"></i></div> | ||
<script th:src="@{/lesson_js/credentials.js}" | ||
language="JavaScript"></script> | ||
<form class="attack-form" accept-charset="UNKNOWN" name="task" | ||
method="POST" | ||
action="/WebGoat/InsecureDeserialization/task" | ||
enctype="application/json;charset=UTF-8"> | ||
|
||
<input type="textarea" rows="4" cols="40" value="" name="token" placeholder="token"/> | ||
<input type="submit" value="Submit" /> | ||
|
||
</form> | ||
<div class="attack-feedback"></div> | ||
<div class="attack-output"></div> | ||
</div> | ||
</div> | ||
</html> |
4 changes: 4 additions & 0 deletions
4
webgoat-lessons/insecure-deserialization/src/main/resources/i18n/WebGoatLabels.properties
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
insecure-deserialization.title=Insecure Deserialization | ||
|
||
insecure-deserialization.intercept.success=Dangerous object received! | ||
insecure-deserialization.intercept.failure=Try again |
6 changes: 6 additions & 0 deletions
6
webgoat-lessons/insecure-deserialization/src/main/resources/js/credentials.js
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
function submit_secret_credentials() { | ||
var xhttp = new XMLHttpRequest(); | ||
xhttp['open']('POST', '#attack/307/100', true); | ||
//sending the request is obfuscated, to descourage js reading | ||
var _0xb7f9=["\x43\x61\x70\x74\x61\x69\x6E\x4A\x61\x63\x6B","\x42\x6C\x61\x63\x6B\x50\x65\x61\x72\x6C","\x73\x74\x72\x69\x6E\x67\x69\x66\x79","\x73\x65\x6E\x64"];xhttp[_0xb7f9[3]](JSON[_0xb7f9[2]]({username:_0xb7f9[0],password:_0xb7f9[1]})) | ||
} |
7 changes: 7 additions & 0 deletions
7
...ialization/src/main/resources/lessonPlans/en/InsecureDeserialization_Intro.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
|
||
== Concept | ||
Encryption is a very inportant tool for secure communication. In this lesson, we will find out, why it should always be employed when sending sensitive data. | ||
|
||
== Goals | ||
* The user should have a basic understanding of packet sniffer usage | ||
* The user will be able to intercept and read an unencrypted requests |
9 changes: 9 additions & 0 deletions
9
...rialization/src/main/resources/lessonPlans/en/InsecureDeserialization_Task.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
=== Let's try | ||
Click the "log in" button to send a request containing login credentials of another user. | ||
|
||
``` | ||
rO0ABXQAVklmIHlvdSBkZXNlcmlhbGl6ZSBtZSBkb3duLCBJIHNoYWxsIGJlY29tZSBtb3JlIHBvd2VyZnVsIHRoYW4geW91IGNhbiBwb3NzaWJseSBpbWFnaW5l | ||
``` | ||
|
||
Then, write these credentials into the appropriate fields and submit to confirm. | ||
Try using a packet sniffer to intercept the request. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters