servlets.module.challenge.UrlAccess3.java Source code

Java tutorial

Introduction

Here is the source code for servlets.module.challenge.UrlAccess3.java

Source

package servlets.module.challenge;

import java.io.IOException;
import java.io.PrintWriter;
import java.util.Locale;
import java.util.ResourceBundle;

import javax.servlet.ServletException;
import javax.servlet.http.Cookie;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;

import org.apache.commons.codec.binary.Base64;
import org.apache.log4j.Logger;

import dbProcs.Getter;
import utils.Hash;
import utils.ShepherdLogManager;
import utils.Validate;

/**
 * Failure to Restrict URL Access 3
 * <br/><br/>
 * This file is part of the Security Shepherd Project.
 * 
 * The Security Shepherd project is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.<br/>
 * 
 * The Security Shepherd project is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.<br/>
 * 
 * You should have received a copy of the GNU General Public License
 * along with the Security Shepherd project.  If not, see <http://www.gnu.org/licenses/>. 
 * @author Mark Denihan
 *
 */
public class UrlAccess3 extends HttpServlet {
    private static final long serialVersionUID = 1L;
    private static org.apache.log4j.Logger log = Logger.getLogger(UrlAccess3.class);
    private static String levelName = "Failure to Restrict URL Access 3";
    private static String levelHash = "e40333fc2c40b8e0169e433366350f55c77b82878329570efa894838980de5b4";

    /**
     * Users must take advance of the broken session management in this application by 
     * modifying the tracking cookie "currentPerson" which is encoded in Base64. 
     * They must modify this cookie to be equal a super admin to access the result key.
     * @param userId Red herring that is pre set to d3d9446802a44259755d38e6d163e820
     * @param secure Red herring that is pre set to true 
     * @param adminDetected Red herring 
     * @param currentPerson Cookie encoded base64 that manages who is signed in to the sub schema
     */
    public void doPost(HttpServletRequest request, HttpServletResponse response)
            throws ServletException, IOException {
        String redherringOne = new String("userId");
        String redherringTwo = new String("secure");

        //Translation Stuff
        Locale locale = new Locale(Validate.validateLanguage(request.getSession()));
        ResourceBundle errors = ResourceBundle.getBundle("i18n.servlets.errors", locale);
        ResourceBundle bundle = ResourceBundle.getBundle("i18n.servlets.challenges.urlAccess.urlAccess3", locale);

        PrintWriter out = response.getWriter();
        out.print(getServletInfo());
        try {
            //Setting IpAddress To Log and taking header for original IP if forwarded from proxy
            ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"));
            HttpSession ses = request.getSession(true);
            if (Validate.validateSession(ses)) {
                ShepherdLogManager.setRequestIp(request.getRemoteAddr(), request.getHeader("X-Forwarded-For"),
                        ses.getAttribute("userName").toString());
                log.debug(levelName + " servlet accessed by: " + ses.getAttribute("userName").toString());
                Cookie userCookies[] = request.getCookies();
                int i = 0;
                Cookie theCookie = null;
                for (i = 0; i < userCookies.length; i++) {
                    if (userCookies[i].getName().compareTo("currentPerson") == 0) {
                        theCookie = userCookies[i];
                        break; //End Loop, because we found the token
                    }
                }
                String htmlOutput = null;
                if (theCookie != null) {
                    log.debug("Cookie value: " + theCookie.getValue());

                    if (theCookie.getValue().equals("TXJKb2huUmVpbGx5VGhlU2Vjb25k")) //If decodes to MrJohnReillyTheSecond
                    {
                        log.debug("Super Admin Cookie detected");
                        // Get key and add it to the output
                        String userKey = Hash.generateUserSolution(
                                Getter.getModuleResultFromHash(getServletContext().getRealPath(""), levelHash),
                                (String) ses.getAttribute("userName"));
                        htmlOutput = "<h2 class='title'>" + bundle.getString("admin.superAdminClub") + "</h2>"
                                + "<p>" + bundle.getString("admin.superAdminClub.keyMessage") + " " + "<a>"
                                + userKey + "</a>" + "</p>";
                    } else if (!theCookie.getValue().equals("YUd1ZXN0")) //If Not "aGuest"
                    {
                        log.debug("Tampered role cookie detected: " + theCookie.getValue());
                        byte[] decodedCookieBytes = Base64.decodeBase64(theCookie.getValue());
                        String decodedCookie = new String(decodedCookieBytes, "UTF-8");
                        log.debug("Decoded Cookie: " + decodedCookie);
                        htmlOutput = "<!-- " + bundle.getString("response.invalidUser") + " -->";
                    } else {
                        log.debug("No change to role cookie submitted");
                    }
                } else {
                    log.debug("No Role Cookie Submitted");
                }
                if (htmlOutput == null) {
                    log.debug("Challenge Not Complete");
                    boolean hackDetected = false;
                    boolean badUserId = false;
                    hackDetected = !(request.getParameter(redherringOne) != null
                            && request.getParameter(redherringTwo) != null);
                    if (!hackDetected) {
                        String paramOne = request.getParameter(redherringOne).toString();
                        String paramTwo = request.getParameter(redherringTwo).toString();
                        log.debug("Param value of " + redherringOne + ":" + paramOne);
                        log.debug("Param value of " + redherringTwo + ":" + paramTwo);
                        badUserId = paramOne.equalsIgnoreCase("d3d9446802a44259755d38e6d163e820");
                        hackDetected = !badUserId && !paramTwo.equalsIgnoreCase("true");
                    }
                    if (!hackDetected) {
                        htmlOutput = "<h2 class='title'>" + bundle.getString("response.notSuperAdmin") + "</h2>"
                                + "<p>" + bundle.getString("response.notSuperAdmin.message") + "</p>";
                    } else {
                        if (badUserId) {
                            htmlOutput = "<h2 class='title'>" + bundle.getString("response.whoAreYou") + "</h2>"
                                    + "<p>" + bundle.getString("response.whoAreYou.message") + "</p>";
                        } else {
                            htmlOutput = "<h2 class='title'>" + bundle.getString("response.hackDetected") + "</h2>"
                                    + "<p>" + bundle.getString("response.hackDetected.message") + "</p>";
                        }
                    }
                }
                log.debug("Outputting HTML");
                out.write(htmlOutput);
            } else {
                log.error(levelName + " servlet accessed with no session");
            }
        } catch (Exception e) {
            out.write(errors.getString("error.funky"));
            log.fatal(levelName + " - " + e.toString());
        }
    }
}