Java tutorial
/* * Copyright 2014 Google Inc. All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except * in compliance with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software distributed under the License * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express * or implied. See the License for the specific language governing permissions and limitations under * the License. */ package com.google.testing.security.firingrange.tests.reverseclickjacking; import static com.google.common.net.UrlEscapers.urlFormParameterEscaper; import com.google.common.annotations.VisibleForTesting; import com.google.common.base.Splitter; import com.google.common.base.Strings; import com.google.testing.security.firingrange.utils.Responses; import com.google.testing.security.firingrange.utils.Templates; import java.io.IOException; import javax.servlet.http.HttpServlet; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; /** * A test case for URC generating a single HTML page with vulnerable Javascript code and an * actionable object (a button). */ public class UniversalReverseClickjackingSinglePage extends HttpServlet { @VisibleForTesting static final String VULNERABLE_PARAMETER = "q"; @Override public void doGet(HttpServletRequest request, HttpServletResponse response) throws IOException { String parameterLocation, template; try { parameterLocation = Splitter.on('/').splitToList(request.getPathInfo()).get(2); } catch (IndexOutOfBoundsException e) { // The parameter location is not set. Return 400 later. Responses.sendError(response, "Please specify the location of the vulnerable parameter.", 400); return; } String vulnerableParameter = Strings.nullToEmpty(request.getParameter(VULNERABLE_PARAMETER)); // Encode URL to prevent XSS vulnerableParameter = urlFormParameterEscaper().escape(vulnerableParameter); switch (parameterLocation) { case "ParameterInQuery": template = Templates.getTemplate("parameter_in_query.tmpl", getClass()); template = Templates.replacePayload(template, vulnerableParameter); break; case "ParameterInFragment": template = Templates.getTemplate("parameter_in_fragment.tmpl", getClass()); break; default: Responses.sendError(response, "Invalid location of the vulnerable parameter.", 400); return; } Responses.sendXssed(response, template); } }