starsofchance commited on
Commit
627e2fe
·
verified ·
1 Parent(s): 566a050

Added CLENAED VERSION OF TEST CASES AND EXPECTED RESULTS FILE

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00001.java +87 -0
  2. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00002.java +74 -0
  3. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00003.java +101 -0
  4. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00004.java +57 -0
  5. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00005.java +104 -0
  6. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00006.java +59 -0
  7. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00007.java +52 -0
  8. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00008.java +50 -0
  9. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00009.java +106 -0
  10. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00010.java +98 -0
  11. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00011.java +52 -0
  12. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00012.java +88 -0
  13. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00013.java +40 -0
  14. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00014.java +40 -0
  15. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00015.java +61 -0
  16. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00016.java +65 -0
  17. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00017.java +54 -0
  18. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00018.java +50 -0
  19. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00019.java +89 -0
  20. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00020.java +133 -0
  21. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00021.java +79 -0
  22. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00022.java +78 -0
  23. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00023.java +78 -0
  24. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00024.java +50 -0
  25. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00025.java +48 -0
  26. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00026.java +58 -0
  27. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00027.java +43 -0
  28. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00028.java +59 -0
  29. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00029.java +86 -0
  30. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00030.java +37 -0
  31. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00031.java +42 -0
  32. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00032.java +50 -0
  33. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00033.java +62 -0
  34. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00034.java +47 -0
  35. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00035.java +104 -0
  36. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00036.java +50 -0
  37. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00037.java +64 -0
  38. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00038.java +79 -0
  39. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00039.java +65 -0
  40. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00040.java +47 -0
  41. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00041.java +38 -0
  42. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00042.java +85 -0
  43. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00043.java +45 -0
  44. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00044.java +80 -0
  45. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00045.java +54 -0
  46. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00046.java +80 -0
  47. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00047.java +57 -0
  48. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00048.java +56 -0
  49. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00049.java +56 -0
  50. OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00050.java +134 -0
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00001.java ADDED
@@ -0,0 +1,87 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/pathtraver-00/BenchmarkTest00001")
10
+ public class BenchmarkTest00001 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ response.setContentType("text/html;charset=UTF-8");
18
+ javax.servlet.http.Cookie userCookie =
19
+ new javax.servlet.http.Cookie("BenchmarkTest00001", "FileName");
20
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
21
+ userCookie.setSecure(true);
22
+ userCookie.setPath(request.getRequestURI());
23
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
24
+ response.addCookie(userCookie);
25
+ javax.servlet.RequestDispatcher rd =
26
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00001.html");
27
+ rd.include(request, response);
28
+ }
29
+
30
+ @Override
31
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
32
+ throws ServletException, IOException {
33
+ // some code
34
+ response.setContentType("text/html;charset=UTF-8");
35
+
36
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
37
+
38
+ String param = "noCookieValueSupplied";
39
+ if (theCookies != null) {
40
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
41
+ if (theCookie.getName().equals("BenchmarkTest00001")) {
42
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
43
+ break;
44
+ }
45
+ }
46
+ }
47
+
48
+ String fileName = null;
49
+ java.io.FileInputStream fis = null;
50
+
51
+ try {
52
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
53
+ fis = new java.io.FileInputStream(new java.io.File(fileName));
54
+ byte[] b = new byte[1000];
55
+ int size = fis.read(b);
56
+ response.getWriter()
57
+ .println(
58
+ "The beginning of file: '"
59
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
60
+ + "' is:\n\n"
61
+ + org.owasp
62
+ .esapi
63
+ .ESAPI
64
+ .encoder()
65
+ .encodeForHTML(new String(b, 0, size)));
66
+ } catch (Exception e) {
67
+ System.out.println("Couldn't open FileInputStream on file: '" + fileName + "'");
68
+ response.getWriter()
69
+ .println(
70
+ "Problem getting FileInputStream: "
71
+ + org.owasp
72
+ .esapi
73
+ .ESAPI
74
+ .encoder()
75
+ .encodeForHTML(e.getMessage()));
76
+ } finally {
77
+ if (fis != null) {
78
+ try {
79
+ fis.close();
80
+ fis = null;
81
+ } catch (Exception e) {
82
+ // we tried...
83
+ }
84
+ }
85
+ }
86
+ }
87
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00002.java ADDED
@@ -0,0 +1,74 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/pathtraver-00/BenchmarkTest00002")
10
+ public class BenchmarkTest00002 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ response.setContentType("text/html;charset=UTF-8");
18
+ javax.servlet.http.Cookie userCookie =
19
+ new javax.servlet.http.Cookie("BenchmarkTest00002", "FileName");
20
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
21
+ userCookie.setSecure(true);
22
+ userCookie.setPath(request.getRequestURI());
23
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
24
+ response.addCookie(userCookie);
25
+ javax.servlet.RequestDispatcher rd =
26
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00002.html");
27
+ rd.include(request, response);
28
+ }
29
+
30
+ @Override
31
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
32
+ throws ServletException, IOException {
33
+ // some code
34
+ response.setContentType("text/html;charset=UTF-8");
35
+
36
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
37
+
38
+ String param = "noCookieValueSupplied";
39
+ if (theCookies != null) {
40
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
41
+ if (theCookie.getName().equals("BenchmarkTest00002")) {
42
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
43
+ break;
44
+ }
45
+ }
46
+ }
47
+
48
+ String fileName = null;
49
+ java.io.FileOutputStream fos = null;
50
+
51
+ try {
52
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
53
+
54
+ fos = new java.io.FileOutputStream(fileName, false);
55
+ response.getWriter()
56
+ .println(
57
+ "Now ready to write to file: "
58
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
59
+
60
+ } catch (Exception e) {
61
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
62
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
63
+ } finally {
64
+ if (fos != null) {
65
+ try {
66
+ fos.close();
67
+ fos = null;
68
+ } catch (Exception e) {
69
+ // we tried...
70
+ }
71
+ }
72
+ }
73
+ }
74
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00003.java ADDED
@@ -0,0 +1,101 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/hash-00/BenchmarkTest00003")
10
+ public class BenchmarkTest00003 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ response.setContentType("text/html;charset=UTF-8");
18
+ javax.servlet.http.Cookie userCookie =
19
+ new javax.servlet.http.Cookie("BenchmarkTest00003", "someSecret");
20
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
21
+ userCookie.setSecure(true);
22
+ userCookie.setPath(request.getRequestURI());
23
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
24
+ response.addCookie(userCookie);
25
+ javax.servlet.RequestDispatcher rd =
26
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00003.html");
27
+ rd.include(request, response);
28
+ }
29
+
30
+ @Override
31
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
32
+ throws ServletException, IOException {
33
+ // some code
34
+ response.setContentType("text/html;charset=UTF-8");
35
+
36
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
37
+
38
+ String param = "noCookieValueSupplied";
39
+ if (theCookies != null) {
40
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
41
+ if (theCookie.getName().equals("BenchmarkTest00003")) {
42
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
43
+ break;
44
+ }
45
+ }
46
+ }
47
+
48
+ try {
49
+ java.util.Properties benchmarkprops = new java.util.Properties();
50
+ benchmarkprops.load(
51
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
52
+ String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
53
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
54
+ byte[] input = {(byte) '?'};
55
+ Object inputParam = param;
56
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
57
+ if (inputParam instanceof java.io.InputStream) {
58
+ byte[] strInput = new byte[1000];
59
+ int i = ((java.io.InputStream) inputParam).read(strInput);
60
+ if (i == -1) {
61
+ response.getWriter()
62
+ .println(
63
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
64
+ return;
65
+ }
66
+ input = java.util.Arrays.copyOf(strInput, i);
67
+ }
68
+ md.update(input);
69
+
70
+ byte[] result = md.digest();
71
+ java.io.File fileTarget =
72
+ new java.io.File(
73
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
74
+ "passwordFile.txt");
75
+ java.io.FileWriter fw =
76
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
77
+ fw.write(
78
+ "hash_value="
79
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
80
+ + "\n");
81
+ fw.close();
82
+ response.getWriter()
83
+ .println(
84
+ "Sensitive value '"
85
+ + org.owasp
86
+ .esapi
87
+ .ESAPI
88
+ .encoder()
89
+ .encodeForHTML(new String(input))
90
+ + "' hashed and stored<br/>");
91
+
92
+ } catch (java.security.NoSuchAlgorithmException e) {
93
+ System.out.println("Problem executing hash - TestCase");
94
+ throw new ServletException(e);
95
+ }
96
+
97
+ response.getWriter()
98
+ .println(
99
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
100
+ }
101
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00004.java ADDED
@@ -0,0 +1,57 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/trustbound-00/BenchmarkTest00004")
10
+ public class BenchmarkTest00004 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ response.setContentType("text/html;charset=UTF-8");
18
+ javax.servlet.http.Cookie userCookie =
19
+ new javax.servlet.http.Cookie("BenchmarkTest00004", "color");
20
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
21
+ userCookie.setSecure(true);
22
+ userCookie.setPath(request.getRequestURI());
23
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
24
+ response.addCookie(userCookie);
25
+ javax.servlet.RequestDispatcher rd =
26
+ request.getRequestDispatcher("/trustbound-00/BenchmarkTest00004.html");
27
+ rd.include(request, response);
28
+ }
29
+
30
+ @Override
31
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
32
+ throws ServletException, IOException {
33
+ // some code
34
+ response.setContentType("text/html;charset=UTF-8");
35
+
36
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
37
+
38
+ String param = "noCookieValueSupplied";
39
+ if (theCookies != null) {
40
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
41
+ if (theCookie.getName().equals("BenchmarkTest00004")) {
42
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
43
+ break;
44
+ }
45
+ }
46
+ }
47
+
48
+ // javax.servlet.http.HttpSession.setAttribute(java.lang.String^,java.lang.Object)
49
+ request.getSession().setAttribute(param, "10340");
50
+
51
+ response.getWriter()
52
+ .println(
53
+ "Item: '"
54
+ + org.owasp.benchmark.helpers.Utils.encodeForHTML(param)
55
+ + "' with value: '10340' saved in session.");
56
+ }
57
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00005.java ADDED
@@ -0,0 +1,104 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/crypto-00/BenchmarkTest00005")
10
+ public class BenchmarkTest00005 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ if (request.getHeader("BenchmarkTest00005") != null) {
28
+ param = request.getHeader("BenchmarkTest00005");
29
+ }
30
+
31
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
32
+ param = java.net.URLDecoder.decode(param, "UTF-8");
33
+
34
+ // Code based on example from:
35
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
36
+ // 8-byte initialization vector
37
+ // byte[] iv = {
38
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
39
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
40
+ // };
41
+ java.security.SecureRandom random = new java.security.SecureRandom();
42
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
43
+
44
+ try {
45
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding");
46
+
47
+ // Prepare the cipher to encrypt
48
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
49
+ java.security.spec.AlgorithmParameterSpec paramSpec =
50
+ new javax.crypto.spec.IvParameterSpec(iv);
51
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
52
+
53
+ // encrypt and store the results
54
+ byte[] input = {(byte) '?'};
55
+ Object inputParam = param;
56
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
57
+ if (inputParam instanceof java.io.InputStream) {
58
+ byte[] strInput = new byte[1000];
59
+ int i = ((java.io.InputStream) inputParam).read(strInput);
60
+ if (i == -1) {
61
+ response.getWriter()
62
+ .println(
63
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
64
+ return;
65
+ }
66
+ input = java.util.Arrays.copyOf(strInput, i);
67
+ }
68
+ byte[] result = c.doFinal(input);
69
+
70
+ java.io.File fileTarget =
71
+ new java.io.File(
72
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
73
+ "passwordFile.txt");
74
+ java.io.FileWriter fw =
75
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
76
+ fw.write(
77
+ "secret_value="
78
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
79
+ + "\n");
80
+ fw.close();
81
+ response.getWriter()
82
+ .println(
83
+ "Sensitive value: '"
84
+ + org.owasp
85
+ .esapi
86
+ .ESAPI
87
+ .encoder()
88
+ .encodeForHTML(new String(input))
89
+ + "' encrypted and stored<br/>");
90
+
91
+ } catch (java.security.NoSuchAlgorithmException
92
+ | javax.crypto.NoSuchPaddingException
93
+ | javax.crypto.IllegalBlockSizeException
94
+ | javax.crypto.BadPaddingException
95
+ | java.security.InvalidKeyException
96
+ | java.security.InvalidAlgorithmParameterException e) {
97
+ response.getWriter()
98
+ .println(
99
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
100
+ e.printStackTrace(response.getWriter());
101
+ throw new ServletException(e);
102
+ }
103
+ }
104
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00006.java ADDED
@@ -0,0 +1,59 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/cmdi-00/BenchmarkTest00006")
10
+ public class BenchmarkTest00006 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ if (request.getHeader("BenchmarkTest00006") != null) {
28
+ param = request.getHeader("BenchmarkTest00006");
29
+ }
30
+
31
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
32
+ param = java.net.URLDecoder.decode(param, "UTF-8");
33
+
34
+ java.util.List<String> argList = new java.util.ArrayList<String>();
35
+
36
+ String osName = System.getProperty("os.name");
37
+ if (osName.indexOf("Windows") != -1) {
38
+ argList.add("cmd.exe");
39
+ argList.add("/c");
40
+ } else {
41
+ argList.add("sh");
42
+ argList.add("-c");
43
+ }
44
+ argList.add("echo " + param);
45
+
46
+ ProcessBuilder pb = new ProcessBuilder();
47
+
48
+ pb.command(argList);
49
+
50
+ try {
51
+ Process p = pb.start();
52
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
53
+ } catch (IOException e) {
54
+ System.out.println(
55
+ "Problem executing cmdi - java.lang.ProcessBuilder(java.util.List) Test Case");
56
+ throw new ServletException(e);
57
+ }
58
+ }
59
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00007.java ADDED
@@ -0,0 +1,52 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/cmdi-00/BenchmarkTest00007")
10
+ public class BenchmarkTest00007 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ if (request.getHeader("BenchmarkTest00007") != null) {
28
+ param = request.getHeader("BenchmarkTest00007");
29
+ }
30
+
31
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
32
+ param = java.net.URLDecoder.decode(param, "UTF-8");
33
+
34
+ String cmd =
35
+ org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
36
+ this.getClass().getClassLoader());
37
+ String[] args = {cmd};
38
+ String[] argsEnv = {param};
39
+
40
+ Runtime r = Runtime.getRuntime();
41
+
42
+ try {
43
+ Process p = r.exec(args, argsEnv);
44
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
45
+ } catch (IOException e) {
46
+ System.out.println("Problem executing cmdi - TestCase");
47
+ response.getWriter()
48
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
49
+ return;
50
+ }
51
+ }
52
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00008.java ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00008")
10
+ public class BenchmarkTest00008 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ if (request.getHeader("BenchmarkTest00008") != null) {
28
+ param = request.getHeader("BenchmarkTest00008");
29
+ }
30
+
31
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
32
+ param = java.net.URLDecoder.decode(param, "UTF-8");
33
+
34
+ String sql = "{call " + param + "}";
35
+
36
+ try {
37
+ java.sql.Connection connection =
38
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
39
+ java.sql.CallableStatement statement = connection.prepareCall(sql);
40
+ java.sql.ResultSet rs = statement.executeQuery();
41
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(rs, sql, response);
42
+
43
+ } catch (java.sql.SQLException e) {
44
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
45
+ response.getWriter().println("Error processing request.");
46
+ return;
47
+ } else throw new ServletException(e);
48
+ }
49
+ }
50
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00009.java ADDED
@@ -0,0 +1,106 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/hash-00/BenchmarkTest00009")
10
+ public class BenchmarkTest00009 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> names = request.getHeaderNames();
28
+ while (names.hasMoreElements()) {
29
+ String name = (String) names.nextElement();
30
+
31
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
32
+ continue; // If standard header, move on to next one
33
+ }
34
+
35
+ java.util.Enumeration<String> values = request.getHeaders(name);
36
+ if (values != null && values.hasMoreElements()) {
37
+ param = name; // Grabs the name of the first non-standard header as the parameter
38
+ // value
39
+ break;
40
+ }
41
+ }
42
+ // Note: We don't URL decode header names because people don't normally do that
43
+
44
+ java.security.Provider[] provider = java.security.Security.getProviders();
45
+ java.security.MessageDigest md;
46
+
47
+ try {
48
+ if (provider.length > 1) {
49
+
50
+ md = java.security.MessageDigest.getInstance("sha-384", provider[0]);
51
+ } else {
52
+ md = java.security.MessageDigest.getInstance("sha-384", "SUN");
53
+ }
54
+ byte[] input = {(byte) '?'};
55
+ Object inputParam = param;
56
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
57
+ if (inputParam instanceof java.io.InputStream) {
58
+ byte[] strInput = new byte[1000];
59
+ int i = ((java.io.InputStream) inputParam).read(strInput);
60
+ if (i == -1) {
61
+ response.getWriter()
62
+ .println(
63
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
64
+ return;
65
+ }
66
+ input = java.util.Arrays.copyOf(strInput, i);
67
+ }
68
+ md.update(input);
69
+
70
+ byte[] result = md.digest();
71
+ java.io.File fileTarget =
72
+ new java.io.File(
73
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
74
+ "passwordFile.txt");
75
+ java.io.FileWriter fw =
76
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
77
+ fw.write(
78
+ "hash_value="
79
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
80
+ + "\n");
81
+ fw.close();
82
+ response.getWriter()
83
+ .println(
84
+ "Sensitive value '"
85
+ + org.owasp
86
+ .esapi
87
+ .ESAPI
88
+ .encoder()
89
+ .encodeForHTML(new String(input))
90
+ + "' hashed and stored<br/>");
91
+
92
+ } catch (java.security.NoSuchAlgorithmException e) {
93
+ System.out.println(
94
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
95
+ throw new ServletException(e);
96
+ } catch (java.security.NoSuchProviderException e) {
97
+ System.out.println(
98
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
99
+ throw new ServletException(e);
100
+ }
101
+
102
+ response.getWriter()
103
+ .println(
104
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider) executed");
105
+ }
106
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00010.java ADDED
@@ -0,0 +1,98 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/weakrand-00/BenchmarkTest00010")
10
+ public class BenchmarkTest00010 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> names = request.getHeaderNames();
28
+ while (names.hasMoreElements()) {
29
+ String name = (String) names.nextElement();
30
+
31
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
32
+ continue; // If standard header, move on to next one
33
+ }
34
+
35
+ java.util.Enumeration<String> values = request.getHeaders(name);
36
+ if (values != null && values.hasMoreElements()) {
37
+ param = name; // Grabs the name of the first non-standard header as the parameter
38
+ // value
39
+ break;
40
+ }
41
+ }
42
+ // Note: We don't URL decode header names because people don't normally do that
43
+
44
+ try {
45
+ int randNumber = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt(99);
46
+ String rememberMeKey = Integer.toString(randNumber);
47
+
48
+ String user = "SafeInga";
49
+ String fullClassName = this.getClass().getName();
50
+ String testCaseNumber =
51
+ fullClassName.substring(
52
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
53
+ user += testCaseNumber;
54
+
55
+ String cookieName = "rememberMe" + testCaseNumber;
56
+
57
+ boolean foundUser = false;
58
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
59
+ if (cookies != null) {
60
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
61
+ javax.servlet.http.Cookie cookie = cookies[i];
62
+ if (cookieName.equals(cookie.getName())) {
63
+ if (cookie.getValue()
64
+ .equals(request.getSession().getAttribute(cookieName))) {
65
+ foundUser = true;
66
+ }
67
+ }
68
+ }
69
+ }
70
+
71
+ if (foundUser) {
72
+ response.getWriter().println("Welcome back: " + user + "<br/>");
73
+ } else {
74
+ javax.servlet.http.Cookie rememberMe =
75
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
76
+ rememberMe.setSecure(true);
77
+ rememberMe.setHttpOnly(true);
78
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
79
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
80
+ request.getSession().setAttribute(cookieName, rememberMeKey);
81
+ response.addCookie(rememberMe);
82
+ response.getWriter()
83
+ .println(
84
+ user
85
+ + " has been remembered with cookie: "
86
+ + rememberMe.getName()
87
+ + " whose value is: "
88
+ + rememberMe.getValue()
89
+ + "<br/>");
90
+ }
91
+ } catch (java.security.NoSuchAlgorithmException e) {
92
+ System.out.println("Problem executing SecureRandom.nextInt(int) - TestCase");
93
+ throw new ServletException(e);
94
+ }
95
+ response.getWriter()
96
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt(int) executed");
97
+ }
98
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00011.java ADDED
@@ -0,0 +1,52 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/pathtraver-00/BenchmarkTest00011")
10
+ public class BenchmarkTest00011 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00011");
28
+
29
+ if (headers != null && headers.hasMoreElements()) {
30
+ param = headers.nextElement(); // just grab first element
31
+ }
32
+
33
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
34
+ param = java.net.URLDecoder.decode(param, "UTF-8");
35
+
36
+ java.io.File fileTarget = new java.io.File(param, "/Test.txt");
37
+ response.getWriter()
38
+ .println(
39
+ "Access to file: '"
40
+ + org.owasp
41
+ .esapi
42
+ .ESAPI
43
+ .encoder()
44
+ .encodeForHTML(fileTarget.toString())
45
+ + "' created.");
46
+ if (fileTarget.exists()) {
47
+ response.getWriter().println(" And file already exists.");
48
+ } else {
49
+ response.getWriter().println(" But file doesn't exist yet.");
50
+ }
51
+ }
52
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00012.java ADDED
@@ -0,0 +1,88 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/ldapi-00/BenchmarkTest00012")
10
+ public class BenchmarkTest00012 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00012");
28
+
29
+ if (headers != null && headers.hasMoreElements()) {
30
+ param = headers.nextElement(); // just grab first element
31
+ }
32
+
33
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
34
+ param = java.net.URLDecoder.decode(param, "UTF-8");
35
+
36
+ org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
37
+ try {
38
+ response.setContentType("text/html;charset=UTF-8");
39
+ String base = "ou=users,ou=system";
40
+ javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
41
+ sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
42
+ String filter = "(&(objectclass=person))(|(uid=" + param + ")(street={0}))";
43
+ Object[] filters = new Object[] {"The streetz 4 Ms bar"};
44
+
45
+ javax.naming.directory.DirContext ctx = ads.getDirContext();
46
+ javax.naming.directory.InitialDirContext idc =
47
+ (javax.naming.directory.InitialDirContext) ctx;
48
+ boolean found = false;
49
+ javax.naming.NamingEnumeration<javax.naming.directory.SearchResult> results =
50
+ idc.search(base, filter, filters, sc);
51
+ while (results.hasMore()) {
52
+ javax.naming.directory.SearchResult sr =
53
+ (javax.naming.directory.SearchResult) results.next();
54
+ javax.naming.directory.Attributes attrs = sr.getAttributes();
55
+
56
+ javax.naming.directory.Attribute attr = attrs.get("uid");
57
+ javax.naming.directory.Attribute attr2 = attrs.get("street");
58
+ if (attr != null) {
59
+ response.getWriter()
60
+ .println(
61
+ "LDAP query results:<br>"
62
+ + "Record found with name "
63
+ + attr.get()
64
+ + "<br>"
65
+ + "Address: "
66
+ + attr2.get()
67
+ + "<br>");
68
+ // System.out.println("record found " + attr.get());
69
+ found = true;
70
+ }
71
+ }
72
+ if (!found) {
73
+ response.getWriter()
74
+ .println(
75
+ "LDAP query results: nothing found for query: "
76
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
77
+ }
78
+ } catch (javax.naming.NamingException e) {
79
+ throw new ServletException(e);
80
+ } finally {
81
+ try {
82
+ ads.closeDirContext();
83
+ } catch (Exception e) {
84
+ throw new ServletException(e);
85
+ }
86
+ }
87
+ }
88
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00013.java ADDED
@@ -0,0 +1,40 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/xss-00/BenchmarkTest00013")
10
+ public class BenchmarkTest00013 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> headers = request.getHeaders("Referer");
28
+
29
+ if (headers != null && headers.hasMoreElements()) {
30
+ param = headers.nextElement(); // just grab first element
31
+ }
32
+
33
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
34
+ param = java.net.URLDecoder.decode(param, "UTF-8");
35
+
36
+ response.setHeader("X-XSS-Protection", "0");
37
+ Object[] obj = {"a", "b"};
38
+ response.getWriter().format(java.util.Locale.US, param, obj);
39
+ }
40
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00014.java ADDED
@@ -0,0 +1,40 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/xss-00/BenchmarkTest00014")
10
+ public class BenchmarkTest00014 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> headers = request.getHeaders("Referer");
28
+
29
+ if (headers != null && headers.hasMoreElements()) {
30
+ param = headers.nextElement(); // just grab first element
31
+ }
32
+
33
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
34
+ param = java.net.URLDecoder.decode(param, "UTF-8");
35
+
36
+ response.setHeader("X-XSS-Protection", "0");
37
+ Object[] obj = {"a", "b"};
38
+ response.getWriter().format(param, obj);
39
+ }
40
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00015.java ADDED
@@ -0,0 +1,61 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/cmdi-00/BenchmarkTest00015")
10
+ public class BenchmarkTest00015 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00015");
28
+
29
+ if (headers != null && headers.hasMoreElements()) {
30
+ param = headers.nextElement(); // just grab first element
31
+ }
32
+
33
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
34
+ param = java.net.URLDecoder.decode(param, "UTF-8");
35
+
36
+ java.util.List<String> argList = new java.util.ArrayList<String>();
37
+
38
+ String osName = System.getProperty("os.name");
39
+ if (osName.indexOf("Windows") != -1) {
40
+ argList.add("cmd.exe");
41
+ argList.add("/c");
42
+ } else {
43
+ argList.add("sh");
44
+ argList.add("-c");
45
+ }
46
+ argList.add("echo " + param);
47
+
48
+ ProcessBuilder pb = new ProcessBuilder();
49
+
50
+ pb.command(argList);
51
+
52
+ try {
53
+ Process p = pb.start();
54
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
55
+ } catch (IOException e) {
56
+ System.out.println(
57
+ "Problem executing cmdi - java.lang.ProcessBuilder(java.util.List) Test Case");
58
+ throw new ServletException(e);
59
+ }
60
+ }
61
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00016.java ADDED
@@ -0,0 +1,65 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/securecookie-00/BenchmarkTest00016")
10
+ public class BenchmarkTest00016 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00016");
28
+
29
+ if (headers != null && headers.hasMoreElements()) {
30
+ param = headers.nextElement(); // just grab first element
31
+ }
32
+
33
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
34
+ param = java.net.URLDecoder.decode(param, "UTF-8");
35
+
36
+ byte[] input = new byte[1000];
37
+ String str = "?";
38
+ Object inputParam = param;
39
+ if (inputParam instanceof String) str = ((String) inputParam);
40
+ if (inputParam instanceof java.io.InputStream) {
41
+ int i = ((java.io.InputStream) inputParam).read(input);
42
+ if (i == -1) {
43
+ response.getWriter()
44
+ .println(
45
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
46
+ return;
47
+ }
48
+ str = new String(input, 0, i);
49
+ }
50
+ if ("".equals(str)) str = "No cookie value supplied";
51
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
52
+
53
+ cookie.setSecure(true);
54
+ cookie.setHttpOnly(true);
55
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
56
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
57
+ response.addCookie(cookie);
58
+
59
+ response.getWriter()
60
+ .println(
61
+ "Created cookie: 'SomeCookie': with value: '"
62
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
63
+ + "' and secure flag set to: true");
64
+ }
65
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00017.java ADDED
@@ -0,0 +1,54 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/cmdi-00/BenchmarkTest00017")
10
+ public class BenchmarkTest00017 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00017");
28
+
29
+ if (headers != null && headers.hasMoreElements()) {
30
+ param = headers.nextElement(); // just grab first element
31
+ }
32
+
33
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
34
+ param = java.net.URLDecoder.decode(param, "UTF-8");
35
+
36
+ String cmd = "";
37
+ String osName = System.getProperty("os.name");
38
+ if (osName.indexOf("Windows") != -1) {
39
+ cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("echo");
40
+ }
41
+
42
+ Runtime r = Runtime.getRuntime();
43
+
44
+ try {
45
+ Process p = r.exec(cmd + param);
46
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
47
+ } catch (IOException e) {
48
+ System.out.println("Problem executing cmdi - TestCase");
49
+ response.getWriter()
50
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
51
+ return;
52
+ }
53
+ }
54
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00018.java ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00018")
10
+ public class BenchmarkTest00018 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00018");
28
+
29
+ if (headers != null && headers.hasMoreElements()) {
30
+ param = headers.nextElement(); // just grab first element
31
+ }
32
+
33
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
34
+ param = java.net.URLDecoder.decode(param, "UTF-8");
35
+
36
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
37
+
38
+ try {
39
+ java.sql.Statement statement =
40
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
41
+ int count = statement.executeUpdate(sql);
42
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
43
+ } catch (java.sql.SQLException e) {
44
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
45
+ response.getWriter().println("Error processing request.");
46
+ return;
47
+ } else throw new ServletException(e);
48
+ }
49
+ }
50
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00019.java ADDED
@@ -0,0 +1,89 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/crypto-00/BenchmarkTest00019")
10
+ public class BenchmarkTest00019 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ java.io.InputStream param = request.getInputStream();
27
+
28
+ try {
29
+ java.util.Properties benchmarkprops = new java.util.Properties();
30
+ benchmarkprops.load(
31
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
32
+ String algorithm = benchmarkprops.getProperty("cryptoAlg1", "DESede/ECB/PKCS5Padding");
33
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
34
+
35
+ // Prepare the cipher to encrypt
36
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
37
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
38
+
39
+ // encrypt and store the results
40
+ byte[] input = {(byte) '?'};
41
+ Object inputParam = param;
42
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
43
+ if (inputParam instanceof java.io.InputStream) {
44
+ byte[] strInput = new byte[1000];
45
+ int i = ((java.io.InputStream) inputParam).read(strInput);
46
+ if (i == -1) {
47
+ response.getWriter()
48
+ .println(
49
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
50
+ return;
51
+ }
52
+ input = java.util.Arrays.copyOf(strInput, i);
53
+ }
54
+ byte[] result = c.doFinal(input);
55
+
56
+ java.io.File fileTarget =
57
+ new java.io.File(
58
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
59
+ "passwordFile.txt");
60
+ java.io.FileWriter fw =
61
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
62
+ fw.write(
63
+ "secret_value="
64
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
65
+ + "\n");
66
+ fw.close();
67
+ response.getWriter()
68
+ .println(
69
+ "Sensitive value: '"
70
+ + org.owasp
71
+ .esapi
72
+ .ESAPI
73
+ .encoder()
74
+ .encodeForHTML(new String(input))
75
+ + "' encrypted and stored<br/>");
76
+
77
+ } catch (java.security.NoSuchAlgorithmException
78
+ | javax.crypto.NoSuchPaddingException
79
+ | javax.crypto.IllegalBlockSizeException
80
+ | javax.crypto.BadPaddingException
81
+ | java.security.InvalidKeyException e) {
82
+ response.getWriter()
83
+ .println(
84
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
85
+ e.printStackTrace(response.getWriter());
86
+ throw new ServletException(e);
87
+ }
88
+ }
89
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00020.java ADDED
@@ -0,0 +1,133 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/crypto-00/BenchmarkTest00020")
10
+ public class BenchmarkTest00020 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = request.getParameter("BenchmarkTest00020");
27
+ if (param == null) param = "";
28
+
29
+ // Code based on example from:
30
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
31
+ // 8-byte initialization vector
32
+ // byte[] iv = {
33
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
34
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
35
+ // };
36
+ java.security.SecureRandom random = new java.security.SecureRandom();
37
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
38
+
39
+ try {
40
+ javax.crypto.Cipher c =
41
+ javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
42
+ // Prepare the cipher to encrypt
43
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
44
+ java.security.spec.AlgorithmParameterSpec paramSpec =
45
+ new javax.crypto.spec.IvParameterSpec(iv);
46
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
47
+
48
+ // encrypt and store the results
49
+ byte[] input = {(byte) '?'};
50
+ Object inputParam = param;
51
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
52
+ if (inputParam instanceof java.io.InputStream) {
53
+ byte[] strInput = new byte[1000];
54
+ int i = ((java.io.InputStream) inputParam).read(strInput);
55
+ if (i == -1) {
56
+ response.getWriter()
57
+ .println(
58
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
59
+ return;
60
+ }
61
+ input = java.util.Arrays.copyOf(strInput, i);
62
+ }
63
+ byte[] result = c.doFinal(input);
64
+
65
+ java.io.File fileTarget =
66
+ new java.io.File(
67
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
68
+ "passwordFile.txt");
69
+ java.io.FileWriter fw =
70
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
71
+ fw.write(
72
+ "secret_value="
73
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
74
+ + "\n");
75
+ fw.close();
76
+ response.getWriter()
77
+ .println(
78
+ "Sensitive value: '"
79
+ + org.owasp
80
+ .esapi
81
+ .ESAPI
82
+ .encoder()
83
+ .encodeForHTML(new String(input))
84
+ + "' encrypted and stored<br/>");
85
+
86
+ } catch (java.security.NoSuchAlgorithmException e) {
87
+ response.getWriter()
88
+ .println(
89
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
90
+ e.printStackTrace(response.getWriter());
91
+ throw new ServletException(e);
92
+ } catch (java.security.NoSuchProviderException e) {
93
+ response.getWriter()
94
+ .println(
95
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
96
+ e.printStackTrace(response.getWriter());
97
+ throw new ServletException(e);
98
+ } catch (javax.crypto.NoSuchPaddingException e) {
99
+ response.getWriter()
100
+ .println(
101
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
102
+ e.printStackTrace(response.getWriter());
103
+ throw new ServletException(e);
104
+ } catch (javax.crypto.IllegalBlockSizeException e) {
105
+ response.getWriter()
106
+ .println(
107
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
108
+ e.printStackTrace(response.getWriter());
109
+ throw new ServletException(e);
110
+ } catch (javax.crypto.BadPaddingException e) {
111
+ response.getWriter()
112
+ .println(
113
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
114
+ e.printStackTrace(response.getWriter());
115
+ throw new ServletException(e);
116
+ } catch (java.security.InvalidKeyException e) {
117
+ response.getWriter()
118
+ .println(
119
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
120
+ e.printStackTrace(response.getWriter());
121
+ throw new ServletException(e);
122
+ } catch (java.security.InvalidAlgorithmParameterException e) {
123
+ response.getWriter()
124
+ .println(
125
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
126
+ e.printStackTrace(response.getWriter());
127
+ throw new ServletException(e);
128
+ }
129
+ response.getWriter()
130
+ .println(
131
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
132
+ }
133
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00021.java ADDED
@@ -0,0 +1,79 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/ldapi-00/BenchmarkTest00021")
10
+ public class BenchmarkTest00021 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = request.getParameter("BenchmarkTest00021");
27
+ if (param == null) param = "";
28
+
29
+ org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
30
+ try {
31
+ response.setContentType("text/html;charset=UTF-8");
32
+ javax.naming.directory.DirContext ctx = ads.getDirContext();
33
+ String base = "ou=users,ou=system";
34
+ javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
35
+ sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
36
+ String filter = "(&(objectclass=person))(|(uid=" + param + ")(street={0}))";
37
+ Object[] filters = new Object[] {"The streetz 4 Ms bar"};
38
+ // System.out.println("Filter " + filter);
39
+ boolean found = false;
40
+ javax.naming.NamingEnumeration<javax.naming.directory.SearchResult> results =
41
+ ctx.search(base, filter, filters, sc);
42
+ while (results.hasMore()) {
43
+ javax.naming.directory.SearchResult sr =
44
+ (javax.naming.directory.SearchResult) results.next();
45
+ javax.naming.directory.Attributes attrs = sr.getAttributes();
46
+
47
+ javax.naming.directory.Attribute attr = attrs.get("uid");
48
+ javax.naming.directory.Attribute attr2 = attrs.get("street");
49
+ if (attr != null) {
50
+ response.getWriter()
51
+ .println(
52
+ "LDAP query results:<br>"
53
+ + "Record found with name "
54
+ + attr.get()
55
+ + "<br>"
56
+ + "Address: "
57
+ + attr2.get()
58
+ + "<br>");
59
+ // System.out.println("record found " + attr.get());
60
+ found = true;
61
+ }
62
+ }
63
+ if (!found) {
64
+ response.getWriter()
65
+ .println(
66
+ "LDAP query results: nothing found for query: "
67
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
68
+ }
69
+ } catch (javax.naming.NamingException e) {
70
+ throw new ServletException(e);
71
+ } finally {
72
+ try {
73
+ ads.closeDirContext();
74
+ } catch (Exception e) {
75
+ throw new ServletException(e);
76
+ }
77
+ }
78
+ }
79
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00022.java ADDED
@@ -0,0 +1,78 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/hash-00/BenchmarkTest00022")
10
+ public class BenchmarkTest00022 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = request.getParameter("BenchmarkTest00022");
27
+ if (param == null) param = "";
28
+
29
+ try {
30
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance("SHA-256");
31
+ byte[] input = {(byte) '?'};
32
+ Object inputParam = param;
33
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
34
+ if (inputParam instanceof java.io.InputStream) {
35
+ byte[] strInput = new byte[1000];
36
+ int i = ((java.io.InputStream) inputParam).read(strInput);
37
+ if (i == -1) {
38
+ response.getWriter()
39
+ .println(
40
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
41
+ return;
42
+ }
43
+ input = java.util.Arrays.copyOf(strInput, i);
44
+ }
45
+ md.update(input);
46
+
47
+ byte[] result = md.digest();
48
+ java.io.File fileTarget =
49
+ new java.io.File(
50
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
51
+ "passwordFile.txt");
52
+ java.io.FileWriter fw =
53
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
54
+ fw.write(
55
+ "hash_value="
56
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
57
+ + "\n");
58
+ fw.close();
59
+ response.getWriter()
60
+ .println(
61
+ "Sensitive value '"
62
+ + org.owasp
63
+ .esapi
64
+ .ESAPI
65
+ .encoder()
66
+ .encodeForHTML(new String(input))
67
+ + "' hashed and stored<br/>");
68
+
69
+ } catch (java.security.NoSuchAlgorithmException e) {
70
+ System.out.println("Problem executing hash - TestCase");
71
+ throw new ServletException(e);
72
+ }
73
+
74
+ response.getWriter()
75
+ .println(
76
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
77
+ }
78
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00023.java ADDED
@@ -0,0 +1,78 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/weakrand-00/BenchmarkTest00023")
10
+ public class BenchmarkTest00023 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = request.getParameter("BenchmarkTest00023");
27
+ if (param == null) param = "";
28
+
29
+ float rand = new java.util.Random().nextFloat();
30
+ String rememberMeKey = Float.toString(rand).substring(2); // Trim off the 0. at the front.
31
+
32
+ String user = "Floyd";
33
+ String fullClassName = this.getClass().getName();
34
+ String testCaseNumber =
35
+ fullClassName.substring(
36
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
37
+ user += testCaseNumber;
38
+
39
+ String cookieName = "rememberMe" + testCaseNumber;
40
+
41
+ boolean foundUser = false;
42
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
43
+ if (cookies != null) {
44
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
45
+ javax.servlet.http.Cookie cookie = cookies[i];
46
+ if (cookieName.equals(cookie.getName())) {
47
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
48
+ foundUser = true;
49
+ }
50
+ }
51
+ }
52
+ }
53
+
54
+ if (foundUser) {
55
+ response.getWriter().println("Welcome back: " + user + "<br/>");
56
+ } else {
57
+ javax.servlet.http.Cookie rememberMe =
58
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
59
+ rememberMe.setSecure(true);
60
+ rememberMe.setHttpOnly(true);
61
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
62
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
63
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
64
+ request.getSession().setAttribute(cookieName, rememberMeKey);
65
+ response.addCookie(rememberMe);
66
+ response.getWriter()
67
+ .println(
68
+ user
69
+ + " has been remembered with cookie: "
70
+ + rememberMe.getName()
71
+ + " whose value is: "
72
+ + rememberMe.getValue()
73
+ + "<br/>");
74
+ }
75
+
76
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextFloat() executed");
77
+ }
78
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00024.java ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00024")
10
+ public class BenchmarkTest00024 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = request.getParameter("BenchmarkTest00024");
27
+ if (param == null) param = "";
28
+
29
+ String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + param + "'";
30
+
31
+ try {
32
+ java.sql.Connection connection =
33
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
34
+ java.sql.PreparedStatement statement =
35
+ connection.prepareStatement(
36
+ sql,
37
+ java.sql.ResultSet.TYPE_FORWARD_ONLY,
38
+ java.sql.ResultSet.CONCUR_READ_ONLY,
39
+ java.sql.ResultSet.CLOSE_CURSORS_AT_COMMIT);
40
+ statement.setString(1, "foo");
41
+ statement.execute();
42
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
43
+ } catch (java.sql.SQLException e) {
44
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
45
+ response.getWriter().println("Error processing request.");
46
+ return;
47
+ } else throw new ServletException(e);
48
+ }
49
+ }
50
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00025.java ADDED
@@ -0,0 +1,48 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00025")
10
+ public class BenchmarkTest00025 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = request.getParameter("BenchmarkTest00025");
27
+ if (param == null) param = "";
28
+
29
+ String sql = "SELECT userid from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
30
+ try {
31
+ // Long results =
32
+ // org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForLong(sql);
33
+ Long results =
34
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForObject(
35
+ sql, Long.class);
36
+ response.getWriter().println("Your results are: " + String.valueOf(results));
37
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
38
+ response.getWriter()
39
+ .println(
40
+ "No results returned for query: "
41
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
42
+ } catch (org.springframework.dao.DataAccessException e) {
43
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
44
+ response.getWriter().println("Error processing request.");
45
+ } else throw new ServletException(e);
46
+ }
47
+ }
48
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00026.java ADDED
@@ -0,0 +1,58 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00026")
10
+ public class BenchmarkTest00026 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = request.getParameter("BenchmarkTest00026");
27
+ if (param == null) param = "";
28
+
29
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
30
+ try {
31
+ org.springframework.jdbc.support.rowset.SqlRowSet results =
32
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForRowSet(sql);
33
+ response.getWriter().println("Your results are: ");
34
+
35
+ // System.out.println("Your results are");
36
+ while (results.next()) {
37
+ response.getWriter()
38
+ .println(
39
+ org.owasp
40
+ .esapi
41
+ .ESAPI
42
+ .encoder()
43
+ .encodeForHTML(results.getString("USERNAME"))
44
+ + " ");
45
+ // System.out.println(results.getString("USERNAME"));
46
+ }
47
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
48
+ response.getWriter()
49
+ .println(
50
+ "No results returned for query: "
51
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
52
+ } catch (org.springframework.dao.DataAccessException e) {
53
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
54
+ response.getWriter().println("Error processing request.");
55
+ } else throw new ServletException(e);
56
+ }
57
+ }
58
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00027.java ADDED
@@ -0,0 +1,43 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00027")
10
+ public class BenchmarkTest00027 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = request.getParameter("BenchmarkTest00027");
27
+ if (param == null) param = "";
28
+
29
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
30
+
31
+ try {
32
+ java.sql.Statement statement =
33
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
34
+ int count = statement.executeUpdate(sql);
35
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
36
+ } catch (java.sql.SQLException e) {
37
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
38
+ response.getWriter().println("Error processing request.");
39
+ return;
40
+ } else throw new ServletException(e);
41
+ }
42
+ }
43
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00028.java ADDED
@@ -0,0 +1,59 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/pathtraver-00/BenchmarkTest00028")
10
+ public class BenchmarkTest00028 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ java.util.Map<String, String[]> map = request.getParameterMap();
27
+ String param = "";
28
+ if (!map.isEmpty()) {
29
+ String[] values = map.get("BenchmarkTest00028");
30
+ if (values != null) param = values[0];
31
+ }
32
+
33
+ String fileName = null;
34
+ java.io.FileOutputStream fos = null;
35
+
36
+ try {
37
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
38
+
39
+ fos = new java.io.FileOutputStream(fileName, false);
40
+ response.getWriter()
41
+ .println(
42
+ "Now ready to write to file: "
43
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
44
+
45
+ } catch (Exception e) {
46
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
47
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
48
+ } finally {
49
+ if (fos != null) {
50
+ try {
51
+ fos.close();
52
+ fos = null;
53
+ } catch (Exception e) {
54
+ // we tried...
55
+ }
56
+ }
57
+ }
58
+ }
59
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00029.java ADDED
@@ -0,0 +1,86 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/hash-00/BenchmarkTest00029")
10
+ public class BenchmarkTest00029 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ java.util.Map<String, String[]> map = request.getParameterMap();
27
+ String param = "";
28
+ if (!map.isEmpty()) {
29
+ String[] values = map.get("BenchmarkTest00029");
30
+ if (values != null) param = values[0];
31
+ }
32
+
33
+ try {
34
+ java.util.Properties benchmarkprops = new java.util.Properties();
35
+ benchmarkprops.load(
36
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
37
+ String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
38
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
39
+ byte[] input = {(byte) '?'};
40
+ Object inputParam = param;
41
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
42
+ if (inputParam instanceof java.io.InputStream) {
43
+ byte[] strInput = new byte[1000];
44
+ int i = ((java.io.InputStream) inputParam).read(strInput);
45
+ if (i == -1) {
46
+ response.getWriter()
47
+ .println(
48
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
49
+ return;
50
+ }
51
+ input = java.util.Arrays.copyOf(strInput, i);
52
+ }
53
+ md.update(input);
54
+
55
+ byte[] result = md.digest();
56
+ java.io.File fileTarget =
57
+ new java.io.File(
58
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
59
+ "passwordFile.txt");
60
+ java.io.FileWriter fw =
61
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
62
+ fw.write(
63
+ "hash_value="
64
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
65
+ + "\n");
66
+ fw.close();
67
+ response.getWriter()
68
+ .println(
69
+ "Sensitive value '"
70
+ + org.owasp
71
+ .esapi
72
+ .ESAPI
73
+ .encoder()
74
+ .encodeForHTML(new String(input))
75
+ + "' hashed and stored<br/>");
76
+
77
+ } catch (java.security.NoSuchAlgorithmException e) {
78
+ System.out.println("Problem executing hash - TestCase");
79
+ throw new ServletException(e);
80
+ }
81
+
82
+ response.getWriter()
83
+ .println(
84
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
85
+ }
86
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00030.java ADDED
@@ -0,0 +1,37 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/xss-00/BenchmarkTest00030")
10
+ public class BenchmarkTest00030 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ java.util.Map<String, String[]> map = request.getParameterMap();
27
+ String param = "";
28
+ if (!map.isEmpty()) {
29
+ String[] values = map.get("BenchmarkTest00030");
30
+ if (values != null) param = values[0];
31
+ }
32
+
33
+ response.setHeader("X-XSS-Protection", "0");
34
+ Object[] obj = {"a", "b"};
35
+ response.getWriter().printf(param, obj);
36
+ }
37
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00031.java ADDED
@@ -0,0 +1,42 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/trustbound-00/BenchmarkTest00031")
10
+ public class BenchmarkTest00031 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ java.util.Map<String, String[]> map = request.getParameterMap();
27
+ String param = "";
28
+ if (!map.isEmpty()) {
29
+ String[] values = map.get("BenchmarkTest00031");
30
+ if (values != null) param = values[0];
31
+ }
32
+
33
+ // javax.servlet.http.HttpSession.putValue(java.lang.String,java.lang.Object^)
34
+ request.getSession().putValue("userid", param);
35
+
36
+ response.getWriter()
37
+ .println(
38
+ "Item: 'userid' with value: '"
39
+ + org.owasp.benchmark.helpers.Utils.encodeForHTML(param)
40
+ + "' saved in session.");
41
+ }
42
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00032.java ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00032")
10
+ public class BenchmarkTest00032 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ java.util.Map<String, String[]> map = request.getParameterMap();
27
+ String param = "";
28
+ if (!map.isEmpty()) {
29
+ String[] values = map.get("BenchmarkTest00032");
30
+ if (values != null) param = values[0];
31
+ }
32
+
33
+ try {
34
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
35
+
36
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.execute(sql);
37
+ response.getWriter()
38
+ .println(
39
+ "No results can be displayed for query: "
40
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
41
+ + "<br>"
42
+ + " because the Spring execute method doesn't return results.");
43
+
44
+ } catch (org.springframework.dao.DataAccessException e) {
45
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
46
+ response.getWriter().println("Error processing request.");
47
+ } else throw new ServletException(e);
48
+ }
49
+ }
50
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00033.java ADDED
@@ -0,0 +1,62 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00033")
10
+ public class BenchmarkTest00033 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ java.util.Map<String, String[]> map = request.getParameterMap();
27
+ String param = "";
28
+ if (!map.isEmpty()) {
29
+ String[] values = map.get("BenchmarkTest00033");
30
+ if (values != null) param = values[0];
31
+ }
32
+
33
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
34
+ try {
35
+ org.springframework.jdbc.support.rowset.SqlRowSet results =
36
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForRowSet(sql);
37
+ response.getWriter().println("Your results are: ");
38
+
39
+ // System.out.println("Your results are");
40
+ while (results.next()) {
41
+ response.getWriter()
42
+ .println(
43
+ org.owasp
44
+ .esapi
45
+ .ESAPI
46
+ .encoder()
47
+ .encodeForHTML(results.getString("USERNAME"))
48
+ + " ");
49
+ // System.out.println(results.getString("USERNAME"));
50
+ }
51
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
52
+ response.getWriter()
53
+ .println(
54
+ "No results returned for query: "
55
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
56
+ } catch (org.springframework.dao.DataAccessException e) {
57
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
58
+ response.getWriter().println("Error processing request.");
59
+ } else throw new ServletException(e);
60
+ }
61
+ }
62
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00034.java ADDED
@@ -0,0 +1,47 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00034")
10
+ public class BenchmarkTest00034 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ java.util.Map<String, String[]> map = request.getParameterMap();
27
+ String param = "";
28
+ if (!map.isEmpty()) {
29
+ String[] values = map.get("BenchmarkTest00034");
30
+ if (values != null) param = values[0];
31
+ }
32
+
33
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
34
+
35
+ try {
36
+ java.sql.Statement statement =
37
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
38
+ statement.execute(sql, java.sql.Statement.RETURN_GENERATED_KEYS);
39
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
40
+ } catch (java.sql.SQLException e) {
41
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
42
+ response.getWriter().println("Error processing request.");
43
+ return;
44
+ } else throw new ServletException(e);
45
+ }
46
+ }
47
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00035.java ADDED
@@ -0,0 +1,104 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/crypto-00/BenchmarkTest00035")
10
+ public class BenchmarkTest00035 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ boolean flag = true;
28
+ java.util.Enumeration<String> names = request.getParameterNames();
29
+ while (names.hasMoreElements() && flag) {
30
+ String name = (String) names.nextElement();
31
+ String[] values = request.getParameterValues(name);
32
+ if (values != null) {
33
+ for (int i = 0; i < values.length && flag; i++) {
34
+ String value = values[i];
35
+ if (value.equals("BenchmarkTest00035")) {
36
+ param = name;
37
+ flag = false;
38
+ }
39
+ }
40
+ }
41
+ }
42
+
43
+ try {
44
+ java.util.Properties benchmarkprops = new java.util.Properties();
45
+ benchmarkprops.load(
46
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
47
+ String algorithm = benchmarkprops.getProperty("cryptoAlg1", "DESede/ECB/PKCS5Padding");
48
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
49
+
50
+ // Prepare the cipher to encrypt
51
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
52
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
53
+
54
+ // encrypt and store the results
55
+ byte[] input = {(byte) '?'};
56
+ Object inputParam = param;
57
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
58
+ if (inputParam instanceof java.io.InputStream) {
59
+ byte[] strInput = new byte[1000];
60
+ int i = ((java.io.InputStream) inputParam).read(strInput);
61
+ if (i == -1) {
62
+ response.getWriter()
63
+ .println(
64
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
65
+ return;
66
+ }
67
+ input = java.util.Arrays.copyOf(strInput, i);
68
+ }
69
+ byte[] result = c.doFinal(input);
70
+
71
+ java.io.File fileTarget =
72
+ new java.io.File(
73
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
74
+ "passwordFile.txt");
75
+ java.io.FileWriter fw =
76
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
77
+ fw.write(
78
+ "secret_value="
79
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
80
+ + "\n");
81
+ fw.close();
82
+ response.getWriter()
83
+ .println(
84
+ "Sensitive value: '"
85
+ + org.owasp
86
+ .esapi
87
+ .ESAPI
88
+ .encoder()
89
+ .encodeForHTML(new String(input))
90
+ + "' encrypted and stored<br/>");
91
+
92
+ } catch (java.security.NoSuchAlgorithmException
93
+ | javax.crypto.NoSuchPaddingException
94
+ | javax.crypto.IllegalBlockSizeException
95
+ | javax.crypto.BadPaddingException
96
+ | java.security.InvalidKeyException e) {
97
+ response.getWriter()
98
+ .println(
99
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
100
+ e.printStackTrace(response.getWriter());
101
+ throw new ServletException(e);
102
+ }
103
+ }
104
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00036.java ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/xss-00/BenchmarkTest00036")
10
+ public class BenchmarkTest00036 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ boolean flag = true;
28
+ java.util.Enumeration<String> names = request.getParameterNames();
29
+ while (names.hasMoreElements() && flag) {
30
+ String name = (String) names.nextElement();
31
+ String[] values = request.getParameterValues(name);
32
+ if (values != null) {
33
+ for (int i = 0; i < values.length && flag; i++) {
34
+ String value = values[i];
35
+ if (value.equals("BenchmarkTest00036")) {
36
+ param = name;
37
+ flag = false;
38
+ }
39
+ }
40
+ }
41
+ }
42
+
43
+ response.setHeader("X-XSS-Protection", "0");
44
+ int length = 1;
45
+ if (param != null) {
46
+ length = param.length();
47
+ response.getWriter().write(param.toCharArray(), 0, length);
48
+ }
49
+ }
50
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00037.java ADDED
@@ -0,0 +1,64 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00037")
10
+ public class BenchmarkTest00037 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ boolean flag = true;
28
+ java.util.Enumeration<String> names = request.getParameterNames();
29
+ while (names.hasMoreElements() && flag) {
30
+ String name = (String) names.nextElement();
31
+ String[] values = request.getParameterValues(name);
32
+ if (values != null) {
33
+ for (int i = 0; i < values.length && flag; i++) {
34
+ String value = values[i];
35
+ if (value.equals("BenchmarkTest00037")) {
36
+ param = name;
37
+ flag = false;
38
+ }
39
+ }
40
+ }
41
+ }
42
+
43
+ String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + param + "'";
44
+
45
+ try {
46
+ java.sql.Connection connection =
47
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
48
+ java.sql.PreparedStatement statement =
49
+ connection.prepareStatement(
50
+ sql,
51
+ java.sql.ResultSet.TYPE_FORWARD_ONLY,
52
+ java.sql.ResultSet.CONCUR_READ_ONLY,
53
+ java.sql.ResultSet.CLOSE_CURSORS_AT_COMMIT);
54
+ statement.setString(1, "foo");
55
+ statement.execute();
56
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
57
+ } catch (java.sql.SQLException e) {
58
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
59
+ response.getWriter().println("Error processing request.");
60
+ return;
61
+ } else throw new ServletException(e);
62
+ }
63
+ }
64
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00038.java ADDED
@@ -0,0 +1,79 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00038")
10
+ public class BenchmarkTest00038 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ boolean flag = true;
28
+ java.util.Enumeration<String> names = request.getParameterNames();
29
+ while (names.hasMoreElements() && flag) {
30
+ String name = (String) names.nextElement();
31
+ String[] values = request.getParameterValues(name);
32
+ if (values != null) {
33
+ for (int i = 0; i < values.length && flag; i++) {
34
+ String value = values[i];
35
+ if (value.equals("BenchmarkTest00038")) {
36
+ param = name;
37
+ flag = false;
38
+ }
39
+ }
40
+ }
41
+ }
42
+
43
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
44
+ try {
45
+ java.util.List<String> results =
46
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.query(
47
+ sql,
48
+ new org.springframework.jdbc.core.RowMapper<String>() {
49
+ @Override
50
+ public String mapRow(java.sql.ResultSet rs, int rowNum)
51
+ throws java.sql.SQLException {
52
+ try {
53
+ return rs.getString("USERNAME");
54
+ } catch (java.sql.SQLException e) {
55
+ if (org.owasp.benchmark.helpers.DatabaseHelper
56
+ .hideSQLErrors) {
57
+ return "Error processing query.";
58
+ } else throw e;
59
+ }
60
+ }
61
+ });
62
+ response.getWriter().println("Your results are: ");
63
+
64
+ for (String s : results) {
65
+ response.getWriter()
66
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(s) + "<br>");
67
+ }
68
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
69
+ response.getWriter()
70
+ .println(
71
+ "No results returned for query: "
72
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
73
+ } catch (org.springframework.dao.DataAccessException e) {
74
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
75
+ response.getWriter().println("Error processing request.");
76
+ } else throw new ServletException(e);
77
+ }
78
+ }
79
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00039.java ADDED
@@ -0,0 +1,65 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00039")
10
+ public class BenchmarkTest00039 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String param = "";
27
+ boolean flag = true;
28
+ java.util.Enumeration<String> names = request.getParameterNames();
29
+ while (names.hasMoreElements() && flag) {
30
+ String name = (String) names.nextElement();
31
+ String[] values = request.getParameterValues(name);
32
+ if (values != null) {
33
+ for (int i = 0; i < values.length && flag; i++) {
34
+ String value = values[i];
35
+ if (value.equals("BenchmarkTest00039")) {
36
+ param = name;
37
+ flag = false;
38
+ }
39
+ }
40
+ }
41
+ }
42
+
43
+ String sql =
44
+ "SELECT TOP 1 userid from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
45
+ try {
46
+ java.util.Map<String, Object> results =
47
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForMap(sql);
48
+ response.getWriter().println("Your results are: ");
49
+
50
+ // System.out.println("Your results are");
51
+ response.getWriter()
52
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(results.toString()));
53
+ // System.out.println(results.toString());
54
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
55
+ response.getWriter()
56
+ .println(
57
+ "No results returned for query: "
58
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
59
+ } catch (org.springframework.dao.DataAccessException e) {
60
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
61
+ response.getWriter().println("Error processing request.");
62
+ } else throw new ServletException(e);
63
+ }
64
+ }
65
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00040.java ADDED
@@ -0,0 +1,47 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/pathtraver-00/BenchmarkTest00040")
10
+ public class BenchmarkTest00040 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
27
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
28
+ String param = scr.getTheParameter("BenchmarkTest00040");
29
+ if (param == null) param = "";
30
+
31
+ java.io.File fileTarget = new java.io.File(param);
32
+ response.getWriter()
33
+ .println(
34
+ "Access to file: '"
35
+ + org.owasp
36
+ .esapi
37
+ .ESAPI
38
+ .encoder()
39
+ .encodeForHTML(fileTarget.toString())
40
+ + "' created.");
41
+ if (fileTarget.exists()) {
42
+ response.getWriter().println(" And file already exists.");
43
+ } else {
44
+ response.getWriter().println(" But file doesn't exist yet.");
45
+ }
46
+ }
47
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00041.java ADDED
@@ -0,0 +1,38 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/xss-00/BenchmarkTest00041")
10
+ public class BenchmarkTest00041 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
27
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
28
+ String param = scr.getTheParameter("BenchmarkTest00041");
29
+ if (param == null) param = "";
30
+
31
+ response.setHeader("X-XSS-Protection", "0");
32
+ int length = 1;
33
+ if (param != null) {
34
+ length = param.length();
35
+ response.getWriter().write(param, 0, length);
36
+ }
37
+ }
38
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00042.java ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/weakrand-00/BenchmarkTest00042")
10
+ public class BenchmarkTest00042 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
27
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
28
+ String param = scr.getTheParameter("BenchmarkTest00042");
29
+ if (param == null) param = "";
30
+
31
+ try {
32
+ int r = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt();
33
+ String rememberMeKey = Integer.toString(r);
34
+
35
+ String user = "SafeIngrid";
36
+ String fullClassName = this.getClass().getName();
37
+ String testCaseNumber =
38
+ fullClassName.substring(
39
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
40
+ user += testCaseNumber;
41
+
42
+ String cookieName = "rememberMe" + testCaseNumber;
43
+
44
+ boolean foundUser = false;
45
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
46
+ if (cookies != null) {
47
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
48
+ javax.servlet.http.Cookie cookie = cookies[i];
49
+ if (cookieName.equals(cookie.getName())) {
50
+ if (cookie.getValue()
51
+ .equals(request.getSession().getAttribute(cookieName))) {
52
+ foundUser = true;
53
+ }
54
+ }
55
+ }
56
+ }
57
+
58
+ if (foundUser) {
59
+ response.getWriter().println("Welcome back: " + user + "<br/>");
60
+ } else {
61
+ javax.servlet.http.Cookie rememberMe =
62
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
63
+ rememberMe.setSecure(true);
64
+ rememberMe.setHttpOnly(true);
65
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
66
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
67
+ request.getSession().setAttribute(cookieName, rememberMeKey);
68
+ response.addCookie(rememberMe);
69
+ response.getWriter()
70
+ .println(
71
+ user
72
+ + " has been remembered with cookie: "
73
+ + rememberMe.getName()
74
+ + " whose value is: "
75
+ + rememberMe.getValue()
76
+ + "<br/>");
77
+ }
78
+ } catch (java.security.NoSuchAlgorithmException e) {
79
+ System.out.println("Problem executing SecureRandom.nextInt() - TestCase");
80
+ throw new ServletException(e);
81
+ }
82
+ response.getWriter()
83
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt() executed");
84
+ }
85
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00043.java ADDED
@@ -0,0 +1,45 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/sqli-00/BenchmarkTest00043")
10
+ public class BenchmarkTest00043 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
27
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
28
+ String param = scr.getTheParameter("BenchmarkTest00043");
29
+ if (param == null) param = "";
30
+
31
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
32
+
33
+ try {
34
+ java.sql.Statement statement =
35
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
36
+ int count = statement.executeUpdate(sql, new int[] {1, 2});
37
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
38
+ } catch (java.sql.SQLException e) {
39
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
40
+ response.getWriter().println("Error processing request.");
41
+ return;
42
+ } else throw new ServletException(e);
43
+ }
44
+ }
45
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00044.java ADDED
@@ -0,0 +1,80 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/ldapi-00/BenchmarkTest00044")
10
+ public class BenchmarkTest00044 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String[] values = request.getParameterValues("BenchmarkTest00044");
27
+ String param;
28
+ if (values != null && values.length > 0) param = values[0];
29
+ else param = "";
30
+
31
+ org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
32
+ try {
33
+ response.setContentType("text/html;charset=UTF-8");
34
+ javax.naming.directory.DirContext ctx = ads.getDirContext();
35
+ String base = "ou=users,ou=system";
36
+ javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
37
+ sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
38
+ String filter = "(&(objectclass=person)(uid=" + param + "))";
39
+ // System.out.println("Filter " + filter);
40
+ boolean found = false;
41
+ javax.naming.NamingEnumeration<javax.naming.directory.SearchResult> results =
42
+ ctx.search(base, filter, sc);
43
+ while (results.hasMore()) {
44
+ javax.naming.directory.SearchResult sr =
45
+ (javax.naming.directory.SearchResult) results.next();
46
+ javax.naming.directory.Attributes attrs = sr.getAttributes();
47
+
48
+ javax.naming.directory.Attribute attr = attrs.get("uid");
49
+ javax.naming.directory.Attribute attr2 = attrs.get("street");
50
+ if (attr != null) {
51
+ response.getWriter()
52
+ .println(
53
+ "LDAP query results:<br>"
54
+ + "Record found with name "
55
+ + attr.get()
56
+ + "<br>"
57
+ + "Address: "
58
+ + attr2.get()
59
+ + "<br>");
60
+ // System.out.println("record found " + attr.get());
61
+ found = true;
62
+ }
63
+ }
64
+ if (!found) {
65
+ response.getWriter()
66
+ .println(
67
+ "LDAP query results: nothing found for query: "
68
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
69
+ }
70
+ } catch (javax.naming.NamingException e) {
71
+ throw new ServletException(e);
72
+ } finally {
73
+ try {
74
+ ads.closeDirContext();
75
+ } catch (Exception e) {
76
+ throw new ServletException(e);
77
+ }
78
+ }
79
+ }
80
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00045.java ADDED
@@ -0,0 +1,54 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/pathtraver-00/BenchmarkTest00045")
10
+ public class BenchmarkTest00045 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String[] values = request.getParameterValues("BenchmarkTest00045");
27
+ String param;
28
+ if (values != null && values.length > 0) param = values[0];
29
+ else param = "";
30
+
31
+ String fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
32
+
33
+ try (
34
+ // Create the file first so the test won't throw an exception if it doesn't exist.
35
+ // Note: Don't actually do this because this method signature could cause a tool to find
36
+ // THIS file constructor
37
+ // as a vuln, rather than the File signature we are trying to actually test.
38
+ // If necessary, just run the benchmark twice. The 1st run should create all the necessary
39
+ // files.
40
+ // new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR +
41
+ // param).createNewFile();
42
+
43
+ java.io.FileOutputStream fos =
44
+ new java.io.FileOutputStream(new java.io.FileInputStream(fileName).getFD()); ) {
45
+ response.getWriter()
46
+ .println(
47
+ "Now ready to write to file: "
48
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
49
+
50
+ } catch (Exception e) {
51
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
52
+ }
53
+ }
54
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00046.java ADDED
@@ -0,0 +1,80 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/hash-00/BenchmarkTest00046")
10
+ public class BenchmarkTest00046 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String[] values = request.getParameterValues("BenchmarkTest00046");
27
+ String param;
28
+ if (values != null && values.length > 0) param = values[0];
29
+ else param = "";
30
+
31
+ try {
32
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance("MD5");
33
+ byte[] input = {(byte) '?'};
34
+ Object inputParam = param;
35
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
36
+ if (inputParam instanceof java.io.InputStream) {
37
+ byte[] strInput = new byte[1000];
38
+ int i = ((java.io.InputStream) inputParam).read(strInput);
39
+ if (i == -1) {
40
+ response.getWriter()
41
+ .println(
42
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
43
+ return;
44
+ }
45
+ input = java.util.Arrays.copyOf(strInput, i);
46
+ }
47
+ md.update(input);
48
+
49
+ byte[] result = md.digest();
50
+ java.io.File fileTarget =
51
+ new java.io.File(
52
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
53
+ "passwordFile.txt");
54
+ java.io.FileWriter fw =
55
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
56
+ fw.write(
57
+ "hash_value="
58
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
59
+ + "\n");
60
+ fw.close();
61
+ response.getWriter()
62
+ .println(
63
+ "Sensitive value '"
64
+ + org.owasp
65
+ .esapi
66
+ .ESAPI
67
+ .encoder()
68
+ .encodeForHTML(new String(input))
69
+ + "' hashed and stored<br/>");
70
+
71
+ } catch (java.security.NoSuchAlgorithmException e) {
72
+ System.out.println("Problem executing hash - TestCase");
73
+ throw new ServletException(e);
74
+ }
75
+
76
+ response.getWriter()
77
+ .println(
78
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
79
+ }
80
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00047.java ADDED
@@ -0,0 +1,57 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/xss-00/BenchmarkTest00047")
10
+ public class BenchmarkTest00047 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String queryString = request.getQueryString();
27
+ String paramval = "BenchmarkTest00047" + "=";
28
+ int paramLoc = -1;
29
+ if (queryString != null) paramLoc = queryString.indexOf(paramval);
30
+ if (paramLoc == -1) {
31
+ response.getWriter()
32
+ .println(
33
+ "getQueryString() couldn't find expected parameter '"
34
+ + "BenchmarkTest00047"
35
+ + "' in query string.");
36
+ return;
37
+ }
38
+
39
+ String param =
40
+ queryString.substring(
41
+ paramLoc
42
+ + paramval
43
+ .length()); // 1st assume "BenchmarkTest00047" param is last
44
+ // parameter in query string.
45
+ // And then check to see if its in the middle of the query string and if so, trim off what
46
+ // comes after.
47
+ int ampersandLoc = queryString.indexOf("&", paramLoc);
48
+ if (ampersandLoc != -1) {
49
+ param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
50
+ }
51
+ param = java.net.URLDecoder.decode(param, "UTF-8");
52
+
53
+ response.setHeader("X-XSS-Protection", "0");
54
+ Object[] obj = {"a", "b"};
55
+ response.getWriter().format(param, obj);
56
+ }
57
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00048.java ADDED
@@ -0,0 +1,56 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/xss-00/BenchmarkTest00048")
10
+ public class BenchmarkTest00048 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String queryString = request.getQueryString();
27
+ String paramval = "BenchmarkTest00048" + "=";
28
+ int paramLoc = -1;
29
+ if (queryString != null) paramLoc = queryString.indexOf(paramval);
30
+ if (paramLoc == -1) {
31
+ response.getWriter()
32
+ .println(
33
+ "getQueryString() couldn't find expected parameter '"
34
+ + "BenchmarkTest00048"
35
+ + "' in query string.");
36
+ return;
37
+ }
38
+
39
+ String param =
40
+ queryString.substring(
41
+ paramLoc
42
+ + paramval
43
+ .length()); // 1st assume "BenchmarkTest00048" param is last
44
+ // parameter in query string.
45
+ // And then check to see if its in the middle of the query string and if so, trim off what
46
+ // comes after.
47
+ int ampersandLoc = queryString.indexOf("&", paramLoc);
48
+ if (ampersandLoc != -1) {
49
+ param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
50
+ }
51
+ param = java.net.URLDecoder.decode(param, "UTF-8");
52
+
53
+ response.setHeader("X-XSS-Protection", "0");
54
+ response.getWriter().print(param.toCharArray());
55
+ }
56
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00049.java ADDED
@@ -0,0 +1,56 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/xss-00/BenchmarkTest00049")
10
+ public class BenchmarkTest00049 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ String queryString = request.getQueryString();
27
+ String paramval = "BenchmarkTest00049" + "=";
28
+ int paramLoc = -1;
29
+ if (queryString != null) paramLoc = queryString.indexOf(paramval);
30
+ if (paramLoc == -1) {
31
+ response.getWriter()
32
+ .println(
33
+ "getQueryString() couldn't find expected parameter '"
34
+ + "BenchmarkTest00049"
35
+ + "' in query string.");
36
+ return;
37
+ }
38
+
39
+ String param =
40
+ queryString.substring(
41
+ paramLoc
42
+ + paramval
43
+ .length()); // 1st assume "BenchmarkTest00049" param is last
44
+ // parameter in query string.
45
+ // And then check to see if its in the middle of the query string and if so, trim off what
46
+ // comes after.
47
+ int ampersandLoc = queryString.indexOf("&", paramLoc);
48
+ if (ampersandLoc != -1) {
49
+ param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
50
+ }
51
+ param = java.net.URLDecoder.decode(param, "UTF-8");
52
+
53
+ response.setHeader("X-XSS-Protection", "0");
54
+ response.getWriter().write("Parameter value: " + param);
55
+ }
56
+ }
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00050.java ADDED
@@ -0,0 +1,134 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ import java.io.IOException;
3
+ import javax.servlet.ServletException;
4
+ import javax.servlet.annotation.WebServlet;
5
+ import javax.servlet.http.HttpServlet;
6
+ import javax.servlet.http.HttpServletRequest;
7
+ import javax.servlet.http.HttpServletResponse;
8
+
9
+ @WebServlet(value = "/crypto-00/BenchmarkTest00050")
10
+ public class BenchmarkTest00050 extends HttpServlet {
11
+
12
+ private static final long serialVersionUID = 1L;
13
+
14
+ @Override
15
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
16
+ throws ServletException, IOException {
17
+ doPost(request, response);
18
+ }
19
+
20
+ @Override
21
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
22
+ throws ServletException, IOException {
23
+ // some code
24
+ response.setContentType("text/html;charset=UTF-8");
25
+
26
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
27
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
28
+ String param = scr.getTheValue("BenchmarkTest00050");
29
+
30
+ // Code based on example from:
31
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
32
+ // 8-byte initialization vector
33
+ // byte[] iv = {
34
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
35
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
36
+ // };
37
+ java.security.SecureRandom random = new java.security.SecureRandom();
38
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
39
+
40
+ try {
41
+ javax.crypto.Cipher c =
42
+ javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
43
+ // Prepare the cipher to encrypt
44
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
45
+ java.security.spec.AlgorithmParameterSpec paramSpec =
46
+ new javax.crypto.spec.IvParameterSpec(iv);
47
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
48
+
49
+ // encrypt and store the results
50
+ byte[] input = {(byte) '?'};
51
+ Object inputParam = param;
52
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
53
+ if (inputParam instanceof java.io.InputStream) {
54
+ byte[] strInput = new byte[1000];
55
+ int i = ((java.io.InputStream) inputParam).read(strInput);
56
+ if (i == -1) {
57
+ response.getWriter()
58
+ .println(
59
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
60
+ return;
61
+ }
62
+ input = java.util.Arrays.copyOf(strInput, i);
63
+ }
64
+ byte[] result = c.doFinal(input);
65
+
66
+ java.io.File fileTarget =
67
+ new java.io.File(
68
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
69
+ "passwordFile.txt");
70
+ java.io.FileWriter fw =
71
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
72
+ fw.write(
73
+ "secret_value="
74
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
75
+ + "\n");
76
+ fw.close();
77
+ response.getWriter()
78
+ .println(
79
+ "Sensitive value: '"
80
+ + org.owasp
81
+ .esapi
82
+ .ESAPI
83
+ .encoder()
84
+ .encodeForHTML(new String(input))
85
+ + "' encrypted and stored<br/>");
86
+
87
+ } catch (java.security.NoSuchAlgorithmException e) {
88
+ response.getWriter()
89
+ .println(
90
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
91
+ e.printStackTrace(response.getWriter());
92
+ throw new ServletException(e);
93
+ } catch (java.security.NoSuchProviderException e) {
94
+ response.getWriter()
95
+ .println(
96
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
97
+ e.printStackTrace(response.getWriter());
98
+ throw new ServletException(e);
99
+ } catch (javax.crypto.NoSuchPaddingException e) {
100
+ response.getWriter()
101
+ .println(
102
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
103
+ e.printStackTrace(response.getWriter());
104
+ throw new ServletException(e);
105
+ } catch (javax.crypto.IllegalBlockSizeException e) {
106
+ response.getWriter()
107
+ .println(
108
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
109
+ e.printStackTrace(response.getWriter());
110
+ throw new ServletException(e);
111
+ } catch (javax.crypto.BadPaddingException e) {
112
+ response.getWriter()
113
+ .println(
114
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
115
+ e.printStackTrace(response.getWriter());
116
+ throw new ServletException(e);
117
+ } catch (java.security.InvalidKeyException e) {
118
+ response.getWriter()
119
+ .println(
120
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
121
+ e.printStackTrace(response.getWriter());
122
+ throw new ServletException(e);
123
+ } catch (java.security.InvalidAlgorithmParameterException e) {
124
+ response.getWriter()
125
+ .println(
126
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
127
+ e.printStackTrace(response.getWriter());
128
+ throw new ServletException(e);
129
+ }
130
+ response.getWriter()
131
+ .println(
132
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
133
+ }
134
+ }