Added CLENAED VERSION OF TEST CASES AND EXPECTED RESULTS FILE
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00001.java +87 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00002.java +74 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00003.java +101 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00004.java +57 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00005.java +104 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00006.java +59 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00007.java +52 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00008.java +50 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00009.java +106 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00010.java +98 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00011.java +52 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00012.java +88 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00013.java +40 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00014.java +40 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00015.java +61 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00016.java +65 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00017.java +54 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00018.java +50 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00019.java +89 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00020.java +133 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00021.java +79 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00022.java +78 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00023.java +78 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00024.java +50 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00025.java +48 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00026.java +58 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00027.java +43 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00028.java +59 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00029.java +86 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00030.java +37 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00031.java +42 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00032.java +50 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00033.java +62 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00034.java +47 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00035.java +104 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00036.java +50 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00037.java +64 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00038.java +79 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00039.java +65 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00040.java +47 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00041.java +38 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00042.java +85 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00043.java +45 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00044.java +80 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00045.java +54 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00046.java +80 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00047.java +57 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00048.java +56 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00049.java +56 -0
- OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00050.java +134 -0
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00001.java
ADDED
|
@@ -0,0 +1,87 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/pathtraver-00/BenchmarkTest00001")
|
| 10 |
+
public class BenchmarkTest00001 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 18 |
+
javax.servlet.http.Cookie userCookie =
|
| 19 |
+
new javax.servlet.http.Cookie("BenchmarkTest00001", "FileName");
|
| 20 |
+
userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
|
| 21 |
+
userCookie.setSecure(true);
|
| 22 |
+
userCookie.setPath(request.getRequestURI());
|
| 23 |
+
userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
|
| 24 |
+
response.addCookie(userCookie);
|
| 25 |
+
javax.servlet.RequestDispatcher rd =
|
| 26 |
+
request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00001.html");
|
| 27 |
+
rd.include(request, response);
|
| 28 |
+
}
|
| 29 |
+
|
| 30 |
+
@Override
|
| 31 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 32 |
+
throws ServletException, IOException {
|
| 33 |
+
// some code
|
| 34 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 35 |
+
|
| 36 |
+
javax.servlet.http.Cookie[] theCookies = request.getCookies();
|
| 37 |
+
|
| 38 |
+
String param = "noCookieValueSupplied";
|
| 39 |
+
if (theCookies != null) {
|
| 40 |
+
for (javax.servlet.http.Cookie theCookie : theCookies) {
|
| 41 |
+
if (theCookie.getName().equals("BenchmarkTest00001")) {
|
| 42 |
+
param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
|
| 43 |
+
break;
|
| 44 |
+
}
|
| 45 |
+
}
|
| 46 |
+
}
|
| 47 |
+
|
| 48 |
+
String fileName = null;
|
| 49 |
+
java.io.FileInputStream fis = null;
|
| 50 |
+
|
| 51 |
+
try {
|
| 52 |
+
fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
|
| 53 |
+
fis = new java.io.FileInputStream(new java.io.File(fileName));
|
| 54 |
+
byte[] b = new byte[1000];
|
| 55 |
+
int size = fis.read(b);
|
| 56 |
+
response.getWriter()
|
| 57 |
+
.println(
|
| 58 |
+
"The beginning of file: '"
|
| 59 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
|
| 60 |
+
+ "' is:\n\n"
|
| 61 |
+
+ org.owasp
|
| 62 |
+
.esapi
|
| 63 |
+
.ESAPI
|
| 64 |
+
.encoder()
|
| 65 |
+
.encodeForHTML(new String(b, 0, size)));
|
| 66 |
+
} catch (Exception e) {
|
| 67 |
+
System.out.println("Couldn't open FileInputStream on file: '" + fileName + "'");
|
| 68 |
+
response.getWriter()
|
| 69 |
+
.println(
|
| 70 |
+
"Problem getting FileInputStream: "
|
| 71 |
+
+ org.owasp
|
| 72 |
+
.esapi
|
| 73 |
+
.ESAPI
|
| 74 |
+
.encoder()
|
| 75 |
+
.encodeForHTML(e.getMessage()));
|
| 76 |
+
} finally {
|
| 77 |
+
if (fis != null) {
|
| 78 |
+
try {
|
| 79 |
+
fis.close();
|
| 80 |
+
fis = null;
|
| 81 |
+
} catch (Exception e) {
|
| 82 |
+
// we tried...
|
| 83 |
+
}
|
| 84 |
+
}
|
| 85 |
+
}
|
| 86 |
+
}
|
| 87 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00002.java
ADDED
|
@@ -0,0 +1,74 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/pathtraver-00/BenchmarkTest00002")
|
| 10 |
+
public class BenchmarkTest00002 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 18 |
+
javax.servlet.http.Cookie userCookie =
|
| 19 |
+
new javax.servlet.http.Cookie("BenchmarkTest00002", "FileName");
|
| 20 |
+
userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
|
| 21 |
+
userCookie.setSecure(true);
|
| 22 |
+
userCookie.setPath(request.getRequestURI());
|
| 23 |
+
userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
|
| 24 |
+
response.addCookie(userCookie);
|
| 25 |
+
javax.servlet.RequestDispatcher rd =
|
| 26 |
+
request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00002.html");
|
| 27 |
+
rd.include(request, response);
|
| 28 |
+
}
|
| 29 |
+
|
| 30 |
+
@Override
|
| 31 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 32 |
+
throws ServletException, IOException {
|
| 33 |
+
// some code
|
| 34 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 35 |
+
|
| 36 |
+
javax.servlet.http.Cookie[] theCookies = request.getCookies();
|
| 37 |
+
|
| 38 |
+
String param = "noCookieValueSupplied";
|
| 39 |
+
if (theCookies != null) {
|
| 40 |
+
for (javax.servlet.http.Cookie theCookie : theCookies) {
|
| 41 |
+
if (theCookie.getName().equals("BenchmarkTest00002")) {
|
| 42 |
+
param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
|
| 43 |
+
break;
|
| 44 |
+
}
|
| 45 |
+
}
|
| 46 |
+
}
|
| 47 |
+
|
| 48 |
+
String fileName = null;
|
| 49 |
+
java.io.FileOutputStream fos = null;
|
| 50 |
+
|
| 51 |
+
try {
|
| 52 |
+
fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
|
| 53 |
+
|
| 54 |
+
fos = new java.io.FileOutputStream(fileName, false);
|
| 55 |
+
response.getWriter()
|
| 56 |
+
.println(
|
| 57 |
+
"Now ready to write to file: "
|
| 58 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
|
| 59 |
+
|
| 60 |
+
} catch (Exception e) {
|
| 61 |
+
System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
|
| 62 |
+
// System.out.println("File exception caught and swallowed: " + e.getMessage());
|
| 63 |
+
} finally {
|
| 64 |
+
if (fos != null) {
|
| 65 |
+
try {
|
| 66 |
+
fos.close();
|
| 67 |
+
fos = null;
|
| 68 |
+
} catch (Exception e) {
|
| 69 |
+
// we tried...
|
| 70 |
+
}
|
| 71 |
+
}
|
| 72 |
+
}
|
| 73 |
+
}
|
| 74 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00003.java
ADDED
|
@@ -0,0 +1,101 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/hash-00/BenchmarkTest00003")
|
| 10 |
+
public class BenchmarkTest00003 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 18 |
+
javax.servlet.http.Cookie userCookie =
|
| 19 |
+
new javax.servlet.http.Cookie("BenchmarkTest00003", "someSecret");
|
| 20 |
+
userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
|
| 21 |
+
userCookie.setSecure(true);
|
| 22 |
+
userCookie.setPath(request.getRequestURI());
|
| 23 |
+
userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
|
| 24 |
+
response.addCookie(userCookie);
|
| 25 |
+
javax.servlet.RequestDispatcher rd =
|
| 26 |
+
request.getRequestDispatcher("/hash-00/BenchmarkTest00003.html");
|
| 27 |
+
rd.include(request, response);
|
| 28 |
+
}
|
| 29 |
+
|
| 30 |
+
@Override
|
| 31 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 32 |
+
throws ServletException, IOException {
|
| 33 |
+
// some code
|
| 34 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 35 |
+
|
| 36 |
+
javax.servlet.http.Cookie[] theCookies = request.getCookies();
|
| 37 |
+
|
| 38 |
+
String param = "noCookieValueSupplied";
|
| 39 |
+
if (theCookies != null) {
|
| 40 |
+
for (javax.servlet.http.Cookie theCookie : theCookies) {
|
| 41 |
+
if (theCookie.getName().equals("BenchmarkTest00003")) {
|
| 42 |
+
param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
|
| 43 |
+
break;
|
| 44 |
+
}
|
| 45 |
+
}
|
| 46 |
+
}
|
| 47 |
+
|
| 48 |
+
try {
|
| 49 |
+
java.util.Properties benchmarkprops = new java.util.Properties();
|
| 50 |
+
benchmarkprops.load(
|
| 51 |
+
this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
|
| 52 |
+
String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
|
| 53 |
+
java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
|
| 54 |
+
byte[] input = {(byte) '?'};
|
| 55 |
+
Object inputParam = param;
|
| 56 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 57 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 58 |
+
byte[] strInput = new byte[1000];
|
| 59 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 60 |
+
if (i == -1) {
|
| 61 |
+
response.getWriter()
|
| 62 |
+
.println(
|
| 63 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 64 |
+
return;
|
| 65 |
+
}
|
| 66 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 67 |
+
}
|
| 68 |
+
md.update(input);
|
| 69 |
+
|
| 70 |
+
byte[] result = md.digest();
|
| 71 |
+
java.io.File fileTarget =
|
| 72 |
+
new java.io.File(
|
| 73 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 74 |
+
"passwordFile.txt");
|
| 75 |
+
java.io.FileWriter fw =
|
| 76 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 77 |
+
fw.write(
|
| 78 |
+
"hash_value="
|
| 79 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 80 |
+
+ "\n");
|
| 81 |
+
fw.close();
|
| 82 |
+
response.getWriter()
|
| 83 |
+
.println(
|
| 84 |
+
"Sensitive value '"
|
| 85 |
+
+ org.owasp
|
| 86 |
+
.esapi
|
| 87 |
+
.ESAPI
|
| 88 |
+
.encoder()
|
| 89 |
+
.encodeForHTML(new String(input))
|
| 90 |
+
+ "' hashed and stored<br/>");
|
| 91 |
+
|
| 92 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 93 |
+
System.out.println("Problem executing hash - TestCase");
|
| 94 |
+
throw new ServletException(e);
|
| 95 |
+
}
|
| 96 |
+
|
| 97 |
+
response.getWriter()
|
| 98 |
+
.println(
|
| 99 |
+
"Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
|
| 100 |
+
}
|
| 101 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00004.java
ADDED
|
@@ -0,0 +1,57 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/trustbound-00/BenchmarkTest00004")
|
| 10 |
+
public class BenchmarkTest00004 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 18 |
+
javax.servlet.http.Cookie userCookie =
|
| 19 |
+
new javax.servlet.http.Cookie("BenchmarkTest00004", "color");
|
| 20 |
+
userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
|
| 21 |
+
userCookie.setSecure(true);
|
| 22 |
+
userCookie.setPath(request.getRequestURI());
|
| 23 |
+
userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
|
| 24 |
+
response.addCookie(userCookie);
|
| 25 |
+
javax.servlet.RequestDispatcher rd =
|
| 26 |
+
request.getRequestDispatcher("/trustbound-00/BenchmarkTest00004.html");
|
| 27 |
+
rd.include(request, response);
|
| 28 |
+
}
|
| 29 |
+
|
| 30 |
+
@Override
|
| 31 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 32 |
+
throws ServletException, IOException {
|
| 33 |
+
// some code
|
| 34 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 35 |
+
|
| 36 |
+
javax.servlet.http.Cookie[] theCookies = request.getCookies();
|
| 37 |
+
|
| 38 |
+
String param = "noCookieValueSupplied";
|
| 39 |
+
if (theCookies != null) {
|
| 40 |
+
for (javax.servlet.http.Cookie theCookie : theCookies) {
|
| 41 |
+
if (theCookie.getName().equals("BenchmarkTest00004")) {
|
| 42 |
+
param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
|
| 43 |
+
break;
|
| 44 |
+
}
|
| 45 |
+
}
|
| 46 |
+
}
|
| 47 |
+
|
| 48 |
+
// javax.servlet.http.HttpSession.setAttribute(java.lang.String^,java.lang.Object)
|
| 49 |
+
request.getSession().setAttribute(param, "10340");
|
| 50 |
+
|
| 51 |
+
response.getWriter()
|
| 52 |
+
.println(
|
| 53 |
+
"Item: '"
|
| 54 |
+
+ org.owasp.benchmark.helpers.Utils.encodeForHTML(param)
|
| 55 |
+
+ "' with value: '10340' saved in session.");
|
| 56 |
+
}
|
| 57 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00005.java
ADDED
|
@@ -0,0 +1,104 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/crypto-00/BenchmarkTest00005")
|
| 10 |
+
public class BenchmarkTest00005 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
if (request.getHeader("BenchmarkTest00005") != null) {
|
| 28 |
+
param = request.getHeader("BenchmarkTest00005");
|
| 29 |
+
}
|
| 30 |
+
|
| 31 |
+
// URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
|
| 32 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 33 |
+
|
| 34 |
+
// Code based on example from:
|
| 35 |
+
// http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
|
| 36 |
+
// 8-byte initialization vector
|
| 37 |
+
// byte[] iv = {
|
| 38 |
+
// (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
|
| 39 |
+
// (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
|
| 40 |
+
// };
|
| 41 |
+
java.security.SecureRandom random = new java.security.SecureRandom();
|
| 42 |
+
byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
|
| 43 |
+
|
| 44 |
+
try {
|
| 45 |
+
javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding");
|
| 46 |
+
|
| 47 |
+
// Prepare the cipher to encrypt
|
| 48 |
+
javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
|
| 49 |
+
java.security.spec.AlgorithmParameterSpec paramSpec =
|
| 50 |
+
new javax.crypto.spec.IvParameterSpec(iv);
|
| 51 |
+
c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
|
| 52 |
+
|
| 53 |
+
// encrypt and store the results
|
| 54 |
+
byte[] input = {(byte) '?'};
|
| 55 |
+
Object inputParam = param;
|
| 56 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 57 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 58 |
+
byte[] strInput = new byte[1000];
|
| 59 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 60 |
+
if (i == -1) {
|
| 61 |
+
response.getWriter()
|
| 62 |
+
.println(
|
| 63 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 64 |
+
return;
|
| 65 |
+
}
|
| 66 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 67 |
+
}
|
| 68 |
+
byte[] result = c.doFinal(input);
|
| 69 |
+
|
| 70 |
+
java.io.File fileTarget =
|
| 71 |
+
new java.io.File(
|
| 72 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 73 |
+
"passwordFile.txt");
|
| 74 |
+
java.io.FileWriter fw =
|
| 75 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 76 |
+
fw.write(
|
| 77 |
+
"secret_value="
|
| 78 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 79 |
+
+ "\n");
|
| 80 |
+
fw.close();
|
| 81 |
+
response.getWriter()
|
| 82 |
+
.println(
|
| 83 |
+
"Sensitive value: '"
|
| 84 |
+
+ org.owasp
|
| 85 |
+
.esapi
|
| 86 |
+
.ESAPI
|
| 87 |
+
.encoder()
|
| 88 |
+
.encodeForHTML(new String(input))
|
| 89 |
+
+ "' encrypted and stored<br/>");
|
| 90 |
+
|
| 91 |
+
} catch (java.security.NoSuchAlgorithmException
|
| 92 |
+
| javax.crypto.NoSuchPaddingException
|
| 93 |
+
| javax.crypto.IllegalBlockSizeException
|
| 94 |
+
| javax.crypto.BadPaddingException
|
| 95 |
+
| java.security.InvalidKeyException
|
| 96 |
+
| java.security.InvalidAlgorithmParameterException e) {
|
| 97 |
+
response.getWriter()
|
| 98 |
+
.println(
|
| 99 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 100 |
+
e.printStackTrace(response.getWriter());
|
| 101 |
+
throw new ServletException(e);
|
| 102 |
+
}
|
| 103 |
+
}
|
| 104 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00006.java
ADDED
|
@@ -0,0 +1,59 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/cmdi-00/BenchmarkTest00006")
|
| 10 |
+
public class BenchmarkTest00006 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
if (request.getHeader("BenchmarkTest00006") != null) {
|
| 28 |
+
param = request.getHeader("BenchmarkTest00006");
|
| 29 |
+
}
|
| 30 |
+
|
| 31 |
+
// URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
|
| 32 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 33 |
+
|
| 34 |
+
java.util.List<String> argList = new java.util.ArrayList<String>();
|
| 35 |
+
|
| 36 |
+
String osName = System.getProperty("os.name");
|
| 37 |
+
if (osName.indexOf("Windows") != -1) {
|
| 38 |
+
argList.add("cmd.exe");
|
| 39 |
+
argList.add("/c");
|
| 40 |
+
} else {
|
| 41 |
+
argList.add("sh");
|
| 42 |
+
argList.add("-c");
|
| 43 |
+
}
|
| 44 |
+
argList.add("echo " + param);
|
| 45 |
+
|
| 46 |
+
ProcessBuilder pb = new ProcessBuilder();
|
| 47 |
+
|
| 48 |
+
pb.command(argList);
|
| 49 |
+
|
| 50 |
+
try {
|
| 51 |
+
Process p = pb.start();
|
| 52 |
+
org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
|
| 53 |
+
} catch (IOException e) {
|
| 54 |
+
System.out.println(
|
| 55 |
+
"Problem executing cmdi - java.lang.ProcessBuilder(java.util.List) Test Case");
|
| 56 |
+
throw new ServletException(e);
|
| 57 |
+
}
|
| 58 |
+
}
|
| 59 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00007.java
ADDED
|
@@ -0,0 +1,52 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/cmdi-00/BenchmarkTest00007")
|
| 10 |
+
public class BenchmarkTest00007 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
if (request.getHeader("BenchmarkTest00007") != null) {
|
| 28 |
+
param = request.getHeader("BenchmarkTest00007");
|
| 29 |
+
}
|
| 30 |
+
|
| 31 |
+
// URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
|
| 32 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 33 |
+
|
| 34 |
+
String cmd =
|
| 35 |
+
org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
|
| 36 |
+
this.getClass().getClassLoader());
|
| 37 |
+
String[] args = {cmd};
|
| 38 |
+
String[] argsEnv = {param};
|
| 39 |
+
|
| 40 |
+
Runtime r = Runtime.getRuntime();
|
| 41 |
+
|
| 42 |
+
try {
|
| 43 |
+
Process p = r.exec(args, argsEnv);
|
| 44 |
+
org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
|
| 45 |
+
} catch (IOException e) {
|
| 46 |
+
System.out.println("Problem executing cmdi - TestCase");
|
| 47 |
+
response.getWriter()
|
| 48 |
+
.println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
|
| 49 |
+
return;
|
| 50 |
+
}
|
| 51 |
+
}
|
| 52 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00008.java
ADDED
|
@@ -0,0 +1,50 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00008")
|
| 10 |
+
public class BenchmarkTest00008 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
if (request.getHeader("BenchmarkTest00008") != null) {
|
| 28 |
+
param = request.getHeader("BenchmarkTest00008");
|
| 29 |
+
}
|
| 30 |
+
|
| 31 |
+
// URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
|
| 32 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 33 |
+
|
| 34 |
+
String sql = "{call " + param + "}";
|
| 35 |
+
|
| 36 |
+
try {
|
| 37 |
+
java.sql.Connection connection =
|
| 38 |
+
org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
|
| 39 |
+
java.sql.CallableStatement statement = connection.prepareCall(sql);
|
| 40 |
+
java.sql.ResultSet rs = statement.executeQuery();
|
| 41 |
+
org.owasp.benchmark.helpers.DatabaseHelper.printResults(rs, sql, response);
|
| 42 |
+
|
| 43 |
+
} catch (java.sql.SQLException e) {
|
| 44 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 45 |
+
response.getWriter().println("Error processing request.");
|
| 46 |
+
return;
|
| 47 |
+
} else throw new ServletException(e);
|
| 48 |
+
}
|
| 49 |
+
}
|
| 50 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00009.java
ADDED
|
@@ -0,0 +1,106 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/hash-00/BenchmarkTest00009")
|
| 10 |
+
public class BenchmarkTest00009 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> names = request.getHeaderNames();
|
| 28 |
+
while (names.hasMoreElements()) {
|
| 29 |
+
String name = (String) names.nextElement();
|
| 30 |
+
|
| 31 |
+
if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
|
| 32 |
+
continue; // If standard header, move on to next one
|
| 33 |
+
}
|
| 34 |
+
|
| 35 |
+
java.util.Enumeration<String> values = request.getHeaders(name);
|
| 36 |
+
if (values != null && values.hasMoreElements()) {
|
| 37 |
+
param = name; // Grabs the name of the first non-standard header as the parameter
|
| 38 |
+
// value
|
| 39 |
+
break;
|
| 40 |
+
}
|
| 41 |
+
}
|
| 42 |
+
// Note: We don't URL decode header names because people don't normally do that
|
| 43 |
+
|
| 44 |
+
java.security.Provider[] provider = java.security.Security.getProviders();
|
| 45 |
+
java.security.MessageDigest md;
|
| 46 |
+
|
| 47 |
+
try {
|
| 48 |
+
if (provider.length > 1) {
|
| 49 |
+
|
| 50 |
+
md = java.security.MessageDigest.getInstance("sha-384", provider[0]);
|
| 51 |
+
} else {
|
| 52 |
+
md = java.security.MessageDigest.getInstance("sha-384", "SUN");
|
| 53 |
+
}
|
| 54 |
+
byte[] input = {(byte) '?'};
|
| 55 |
+
Object inputParam = param;
|
| 56 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 57 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 58 |
+
byte[] strInput = new byte[1000];
|
| 59 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 60 |
+
if (i == -1) {
|
| 61 |
+
response.getWriter()
|
| 62 |
+
.println(
|
| 63 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 64 |
+
return;
|
| 65 |
+
}
|
| 66 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 67 |
+
}
|
| 68 |
+
md.update(input);
|
| 69 |
+
|
| 70 |
+
byte[] result = md.digest();
|
| 71 |
+
java.io.File fileTarget =
|
| 72 |
+
new java.io.File(
|
| 73 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 74 |
+
"passwordFile.txt");
|
| 75 |
+
java.io.FileWriter fw =
|
| 76 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 77 |
+
fw.write(
|
| 78 |
+
"hash_value="
|
| 79 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 80 |
+
+ "\n");
|
| 81 |
+
fw.close();
|
| 82 |
+
response.getWriter()
|
| 83 |
+
.println(
|
| 84 |
+
"Sensitive value '"
|
| 85 |
+
+ org.owasp
|
| 86 |
+
.esapi
|
| 87 |
+
.ESAPI
|
| 88 |
+
.encoder()
|
| 89 |
+
.encodeForHTML(new String(input))
|
| 90 |
+
+ "' hashed and stored<br/>");
|
| 91 |
+
|
| 92 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 93 |
+
System.out.println(
|
| 94 |
+
"Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
|
| 95 |
+
throw new ServletException(e);
|
| 96 |
+
} catch (java.security.NoSuchProviderException e) {
|
| 97 |
+
System.out.println(
|
| 98 |
+
"Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
|
| 99 |
+
throw new ServletException(e);
|
| 100 |
+
}
|
| 101 |
+
|
| 102 |
+
response.getWriter()
|
| 103 |
+
.println(
|
| 104 |
+
"Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider) executed");
|
| 105 |
+
}
|
| 106 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00010.java
ADDED
|
@@ -0,0 +1,98 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/weakrand-00/BenchmarkTest00010")
|
| 10 |
+
public class BenchmarkTest00010 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> names = request.getHeaderNames();
|
| 28 |
+
while (names.hasMoreElements()) {
|
| 29 |
+
String name = (String) names.nextElement();
|
| 30 |
+
|
| 31 |
+
if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
|
| 32 |
+
continue; // If standard header, move on to next one
|
| 33 |
+
}
|
| 34 |
+
|
| 35 |
+
java.util.Enumeration<String> values = request.getHeaders(name);
|
| 36 |
+
if (values != null && values.hasMoreElements()) {
|
| 37 |
+
param = name; // Grabs the name of the first non-standard header as the parameter
|
| 38 |
+
// value
|
| 39 |
+
break;
|
| 40 |
+
}
|
| 41 |
+
}
|
| 42 |
+
// Note: We don't URL decode header names because people don't normally do that
|
| 43 |
+
|
| 44 |
+
try {
|
| 45 |
+
int randNumber = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt(99);
|
| 46 |
+
String rememberMeKey = Integer.toString(randNumber);
|
| 47 |
+
|
| 48 |
+
String user = "SafeInga";
|
| 49 |
+
String fullClassName = this.getClass().getName();
|
| 50 |
+
String testCaseNumber =
|
| 51 |
+
fullClassName.substring(
|
| 52 |
+
fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
|
| 53 |
+
user += testCaseNumber;
|
| 54 |
+
|
| 55 |
+
String cookieName = "rememberMe" + testCaseNumber;
|
| 56 |
+
|
| 57 |
+
boolean foundUser = false;
|
| 58 |
+
javax.servlet.http.Cookie[] cookies = request.getCookies();
|
| 59 |
+
if (cookies != null) {
|
| 60 |
+
for (int i = 0; !foundUser && i < cookies.length; i++) {
|
| 61 |
+
javax.servlet.http.Cookie cookie = cookies[i];
|
| 62 |
+
if (cookieName.equals(cookie.getName())) {
|
| 63 |
+
if (cookie.getValue()
|
| 64 |
+
.equals(request.getSession().getAttribute(cookieName))) {
|
| 65 |
+
foundUser = true;
|
| 66 |
+
}
|
| 67 |
+
}
|
| 68 |
+
}
|
| 69 |
+
}
|
| 70 |
+
|
| 71 |
+
if (foundUser) {
|
| 72 |
+
response.getWriter().println("Welcome back: " + user + "<br/>");
|
| 73 |
+
} else {
|
| 74 |
+
javax.servlet.http.Cookie rememberMe =
|
| 75 |
+
new javax.servlet.http.Cookie(cookieName, rememberMeKey);
|
| 76 |
+
rememberMe.setSecure(true);
|
| 77 |
+
rememberMe.setHttpOnly(true);
|
| 78 |
+
rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
|
| 79 |
+
// e.g., /benchmark/sql-01/BenchmarkTest01001
|
| 80 |
+
request.getSession().setAttribute(cookieName, rememberMeKey);
|
| 81 |
+
response.addCookie(rememberMe);
|
| 82 |
+
response.getWriter()
|
| 83 |
+
.println(
|
| 84 |
+
user
|
| 85 |
+
+ " has been remembered with cookie: "
|
| 86 |
+
+ rememberMe.getName()
|
| 87 |
+
+ " whose value is: "
|
| 88 |
+
+ rememberMe.getValue()
|
| 89 |
+
+ "<br/>");
|
| 90 |
+
}
|
| 91 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 92 |
+
System.out.println("Problem executing SecureRandom.nextInt(int) - TestCase");
|
| 93 |
+
throw new ServletException(e);
|
| 94 |
+
}
|
| 95 |
+
response.getWriter()
|
| 96 |
+
.println("Weak Randomness Test java.security.SecureRandom.nextInt(int) executed");
|
| 97 |
+
}
|
| 98 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00011.java
ADDED
|
@@ -0,0 +1,52 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/pathtraver-00/BenchmarkTest00011")
|
| 10 |
+
public class BenchmarkTest00011 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00011");
|
| 28 |
+
|
| 29 |
+
if (headers != null && headers.hasMoreElements()) {
|
| 30 |
+
param = headers.nextElement(); // just grab first element
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
|
| 34 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 35 |
+
|
| 36 |
+
java.io.File fileTarget = new java.io.File(param, "/Test.txt");
|
| 37 |
+
response.getWriter()
|
| 38 |
+
.println(
|
| 39 |
+
"Access to file: '"
|
| 40 |
+
+ org.owasp
|
| 41 |
+
.esapi
|
| 42 |
+
.ESAPI
|
| 43 |
+
.encoder()
|
| 44 |
+
.encodeForHTML(fileTarget.toString())
|
| 45 |
+
+ "' created.");
|
| 46 |
+
if (fileTarget.exists()) {
|
| 47 |
+
response.getWriter().println(" And file already exists.");
|
| 48 |
+
} else {
|
| 49 |
+
response.getWriter().println(" But file doesn't exist yet.");
|
| 50 |
+
}
|
| 51 |
+
}
|
| 52 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00012.java
ADDED
|
@@ -0,0 +1,88 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/ldapi-00/BenchmarkTest00012")
|
| 10 |
+
public class BenchmarkTest00012 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00012");
|
| 28 |
+
|
| 29 |
+
if (headers != null && headers.hasMoreElements()) {
|
| 30 |
+
param = headers.nextElement(); // just grab first element
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
|
| 34 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 35 |
+
|
| 36 |
+
org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
|
| 37 |
+
try {
|
| 38 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 39 |
+
String base = "ou=users,ou=system";
|
| 40 |
+
javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
|
| 41 |
+
sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
|
| 42 |
+
String filter = "(&(objectclass=person))(|(uid=" + param + ")(street={0}))";
|
| 43 |
+
Object[] filters = new Object[] {"The streetz 4 Ms bar"};
|
| 44 |
+
|
| 45 |
+
javax.naming.directory.DirContext ctx = ads.getDirContext();
|
| 46 |
+
javax.naming.directory.InitialDirContext idc =
|
| 47 |
+
(javax.naming.directory.InitialDirContext) ctx;
|
| 48 |
+
boolean found = false;
|
| 49 |
+
javax.naming.NamingEnumeration<javax.naming.directory.SearchResult> results =
|
| 50 |
+
idc.search(base, filter, filters, sc);
|
| 51 |
+
while (results.hasMore()) {
|
| 52 |
+
javax.naming.directory.SearchResult sr =
|
| 53 |
+
(javax.naming.directory.SearchResult) results.next();
|
| 54 |
+
javax.naming.directory.Attributes attrs = sr.getAttributes();
|
| 55 |
+
|
| 56 |
+
javax.naming.directory.Attribute attr = attrs.get("uid");
|
| 57 |
+
javax.naming.directory.Attribute attr2 = attrs.get("street");
|
| 58 |
+
if (attr != null) {
|
| 59 |
+
response.getWriter()
|
| 60 |
+
.println(
|
| 61 |
+
"LDAP query results:<br>"
|
| 62 |
+
+ "Record found with name "
|
| 63 |
+
+ attr.get()
|
| 64 |
+
+ "<br>"
|
| 65 |
+
+ "Address: "
|
| 66 |
+
+ attr2.get()
|
| 67 |
+
+ "<br>");
|
| 68 |
+
// System.out.println("record found " + attr.get());
|
| 69 |
+
found = true;
|
| 70 |
+
}
|
| 71 |
+
}
|
| 72 |
+
if (!found) {
|
| 73 |
+
response.getWriter()
|
| 74 |
+
.println(
|
| 75 |
+
"LDAP query results: nothing found for query: "
|
| 76 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
|
| 77 |
+
}
|
| 78 |
+
} catch (javax.naming.NamingException e) {
|
| 79 |
+
throw new ServletException(e);
|
| 80 |
+
} finally {
|
| 81 |
+
try {
|
| 82 |
+
ads.closeDirContext();
|
| 83 |
+
} catch (Exception e) {
|
| 84 |
+
throw new ServletException(e);
|
| 85 |
+
}
|
| 86 |
+
}
|
| 87 |
+
}
|
| 88 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00013.java
ADDED
|
@@ -0,0 +1,40 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/xss-00/BenchmarkTest00013")
|
| 10 |
+
public class BenchmarkTest00013 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> headers = request.getHeaders("Referer");
|
| 28 |
+
|
| 29 |
+
if (headers != null && headers.hasMoreElements()) {
|
| 30 |
+
param = headers.nextElement(); // just grab first element
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
|
| 34 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 35 |
+
|
| 36 |
+
response.setHeader("X-XSS-Protection", "0");
|
| 37 |
+
Object[] obj = {"a", "b"};
|
| 38 |
+
response.getWriter().format(java.util.Locale.US, param, obj);
|
| 39 |
+
}
|
| 40 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00014.java
ADDED
|
@@ -0,0 +1,40 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/xss-00/BenchmarkTest00014")
|
| 10 |
+
public class BenchmarkTest00014 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> headers = request.getHeaders("Referer");
|
| 28 |
+
|
| 29 |
+
if (headers != null && headers.hasMoreElements()) {
|
| 30 |
+
param = headers.nextElement(); // just grab first element
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
|
| 34 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 35 |
+
|
| 36 |
+
response.setHeader("X-XSS-Protection", "0");
|
| 37 |
+
Object[] obj = {"a", "b"};
|
| 38 |
+
response.getWriter().format(param, obj);
|
| 39 |
+
}
|
| 40 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00015.java
ADDED
|
@@ -0,0 +1,61 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/cmdi-00/BenchmarkTest00015")
|
| 10 |
+
public class BenchmarkTest00015 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00015");
|
| 28 |
+
|
| 29 |
+
if (headers != null && headers.hasMoreElements()) {
|
| 30 |
+
param = headers.nextElement(); // just grab first element
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
|
| 34 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 35 |
+
|
| 36 |
+
java.util.List<String> argList = new java.util.ArrayList<String>();
|
| 37 |
+
|
| 38 |
+
String osName = System.getProperty("os.name");
|
| 39 |
+
if (osName.indexOf("Windows") != -1) {
|
| 40 |
+
argList.add("cmd.exe");
|
| 41 |
+
argList.add("/c");
|
| 42 |
+
} else {
|
| 43 |
+
argList.add("sh");
|
| 44 |
+
argList.add("-c");
|
| 45 |
+
}
|
| 46 |
+
argList.add("echo " + param);
|
| 47 |
+
|
| 48 |
+
ProcessBuilder pb = new ProcessBuilder();
|
| 49 |
+
|
| 50 |
+
pb.command(argList);
|
| 51 |
+
|
| 52 |
+
try {
|
| 53 |
+
Process p = pb.start();
|
| 54 |
+
org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
|
| 55 |
+
} catch (IOException e) {
|
| 56 |
+
System.out.println(
|
| 57 |
+
"Problem executing cmdi - java.lang.ProcessBuilder(java.util.List) Test Case");
|
| 58 |
+
throw new ServletException(e);
|
| 59 |
+
}
|
| 60 |
+
}
|
| 61 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00016.java
ADDED
|
@@ -0,0 +1,65 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/securecookie-00/BenchmarkTest00016")
|
| 10 |
+
public class BenchmarkTest00016 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00016");
|
| 28 |
+
|
| 29 |
+
if (headers != null && headers.hasMoreElements()) {
|
| 30 |
+
param = headers.nextElement(); // just grab first element
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
|
| 34 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 35 |
+
|
| 36 |
+
byte[] input = new byte[1000];
|
| 37 |
+
String str = "?";
|
| 38 |
+
Object inputParam = param;
|
| 39 |
+
if (inputParam instanceof String) str = ((String) inputParam);
|
| 40 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 41 |
+
int i = ((java.io.InputStream) inputParam).read(input);
|
| 42 |
+
if (i == -1) {
|
| 43 |
+
response.getWriter()
|
| 44 |
+
.println(
|
| 45 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 46 |
+
return;
|
| 47 |
+
}
|
| 48 |
+
str = new String(input, 0, i);
|
| 49 |
+
}
|
| 50 |
+
if ("".equals(str)) str = "No cookie value supplied";
|
| 51 |
+
javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
|
| 52 |
+
|
| 53 |
+
cookie.setSecure(true);
|
| 54 |
+
cookie.setHttpOnly(true);
|
| 55 |
+
cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
|
| 56 |
+
// e.g., /benchmark/sql-01/BenchmarkTest01001
|
| 57 |
+
response.addCookie(cookie);
|
| 58 |
+
|
| 59 |
+
response.getWriter()
|
| 60 |
+
.println(
|
| 61 |
+
"Created cookie: 'SomeCookie': with value: '"
|
| 62 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
|
| 63 |
+
+ "' and secure flag set to: true");
|
| 64 |
+
}
|
| 65 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00017.java
ADDED
|
@@ -0,0 +1,54 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/cmdi-00/BenchmarkTest00017")
|
| 10 |
+
public class BenchmarkTest00017 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00017");
|
| 28 |
+
|
| 29 |
+
if (headers != null && headers.hasMoreElements()) {
|
| 30 |
+
param = headers.nextElement(); // just grab first element
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
|
| 34 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 35 |
+
|
| 36 |
+
String cmd = "";
|
| 37 |
+
String osName = System.getProperty("os.name");
|
| 38 |
+
if (osName.indexOf("Windows") != -1) {
|
| 39 |
+
cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("echo");
|
| 40 |
+
}
|
| 41 |
+
|
| 42 |
+
Runtime r = Runtime.getRuntime();
|
| 43 |
+
|
| 44 |
+
try {
|
| 45 |
+
Process p = r.exec(cmd + param);
|
| 46 |
+
org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
|
| 47 |
+
} catch (IOException e) {
|
| 48 |
+
System.out.println("Problem executing cmdi - TestCase");
|
| 49 |
+
response.getWriter()
|
| 50 |
+
.println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
|
| 51 |
+
return;
|
| 52 |
+
}
|
| 53 |
+
}
|
| 54 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00018.java
ADDED
|
@@ -0,0 +1,50 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00018")
|
| 10 |
+
public class BenchmarkTest00018 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest00018");
|
| 28 |
+
|
| 29 |
+
if (headers != null && headers.hasMoreElements()) {
|
| 30 |
+
param = headers.nextElement(); // just grab first element
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
|
| 34 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 35 |
+
|
| 36 |
+
String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
|
| 37 |
+
|
| 38 |
+
try {
|
| 39 |
+
java.sql.Statement statement =
|
| 40 |
+
org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
|
| 41 |
+
int count = statement.executeUpdate(sql);
|
| 42 |
+
org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
|
| 43 |
+
} catch (java.sql.SQLException e) {
|
| 44 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 45 |
+
response.getWriter().println("Error processing request.");
|
| 46 |
+
return;
|
| 47 |
+
} else throw new ServletException(e);
|
| 48 |
+
}
|
| 49 |
+
}
|
| 50 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00019.java
ADDED
|
@@ -0,0 +1,89 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/crypto-00/BenchmarkTest00019")
|
| 10 |
+
public class BenchmarkTest00019 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
java.io.InputStream param = request.getInputStream();
|
| 27 |
+
|
| 28 |
+
try {
|
| 29 |
+
java.util.Properties benchmarkprops = new java.util.Properties();
|
| 30 |
+
benchmarkprops.load(
|
| 31 |
+
this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
|
| 32 |
+
String algorithm = benchmarkprops.getProperty("cryptoAlg1", "DESede/ECB/PKCS5Padding");
|
| 33 |
+
javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
|
| 34 |
+
|
| 35 |
+
// Prepare the cipher to encrypt
|
| 36 |
+
javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
|
| 37 |
+
c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
|
| 38 |
+
|
| 39 |
+
// encrypt and store the results
|
| 40 |
+
byte[] input = {(byte) '?'};
|
| 41 |
+
Object inputParam = param;
|
| 42 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 43 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 44 |
+
byte[] strInput = new byte[1000];
|
| 45 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 46 |
+
if (i == -1) {
|
| 47 |
+
response.getWriter()
|
| 48 |
+
.println(
|
| 49 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 50 |
+
return;
|
| 51 |
+
}
|
| 52 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 53 |
+
}
|
| 54 |
+
byte[] result = c.doFinal(input);
|
| 55 |
+
|
| 56 |
+
java.io.File fileTarget =
|
| 57 |
+
new java.io.File(
|
| 58 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 59 |
+
"passwordFile.txt");
|
| 60 |
+
java.io.FileWriter fw =
|
| 61 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 62 |
+
fw.write(
|
| 63 |
+
"secret_value="
|
| 64 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 65 |
+
+ "\n");
|
| 66 |
+
fw.close();
|
| 67 |
+
response.getWriter()
|
| 68 |
+
.println(
|
| 69 |
+
"Sensitive value: '"
|
| 70 |
+
+ org.owasp
|
| 71 |
+
.esapi
|
| 72 |
+
.ESAPI
|
| 73 |
+
.encoder()
|
| 74 |
+
.encodeForHTML(new String(input))
|
| 75 |
+
+ "' encrypted and stored<br/>");
|
| 76 |
+
|
| 77 |
+
} catch (java.security.NoSuchAlgorithmException
|
| 78 |
+
| javax.crypto.NoSuchPaddingException
|
| 79 |
+
| javax.crypto.IllegalBlockSizeException
|
| 80 |
+
| javax.crypto.BadPaddingException
|
| 81 |
+
| java.security.InvalidKeyException e) {
|
| 82 |
+
response.getWriter()
|
| 83 |
+
.println(
|
| 84 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 85 |
+
e.printStackTrace(response.getWriter());
|
| 86 |
+
throw new ServletException(e);
|
| 87 |
+
}
|
| 88 |
+
}
|
| 89 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00020.java
ADDED
|
@@ -0,0 +1,133 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/crypto-00/BenchmarkTest00020")
|
| 10 |
+
public class BenchmarkTest00020 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = request.getParameter("BenchmarkTest00020");
|
| 27 |
+
if (param == null) param = "";
|
| 28 |
+
|
| 29 |
+
// Code based on example from:
|
| 30 |
+
// http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
|
| 31 |
+
// 8-byte initialization vector
|
| 32 |
+
// byte[] iv = {
|
| 33 |
+
// (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
|
| 34 |
+
// (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
|
| 35 |
+
// };
|
| 36 |
+
java.security.SecureRandom random = new java.security.SecureRandom();
|
| 37 |
+
byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
|
| 38 |
+
|
| 39 |
+
try {
|
| 40 |
+
javax.crypto.Cipher c =
|
| 41 |
+
javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
|
| 42 |
+
// Prepare the cipher to encrypt
|
| 43 |
+
javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
|
| 44 |
+
java.security.spec.AlgorithmParameterSpec paramSpec =
|
| 45 |
+
new javax.crypto.spec.IvParameterSpec(iv);
|
| 46 |
+
c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
|
| 47 |
+
|
| 48 |
+
// encrypt and store the results
|
| 49 |
+
byte[] input = {(byte) '?'};
|
| 50 |
+
Object inputParam = param;
|
| 51 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 52 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 53 |
+
byte[] strInput = new byte[1000];
|
| 54 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 55 |
+
if (i == -1) {
|
| 56 |
+
response.getWriter()
|
| 57 |
+
.println(
|
| 58 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 59 |
+
return;
|
| 60 |
+
}
|
| 61 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 62 |
+
}
|
| 63 |
+
byte[] result = c.doFinal(input);
|
| 64 |
+
|
| 65 |
+
java.io.File fileTarget =
|
| 66 |
+
new java.io.File(
|
| 67 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 68 |
+
"passwordFile.txt");
|
| 69 |
+
java.io.FileWriter fw =
|
| 70 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 71 |
+
fw.write(
|
| 72 |
+
"secret_value="
|
| 73 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 74 |
+
+ "\n");
|
| 75 |
+
fw.close();
|
| 76 |
+
response.getWriter()
|
| 77 |
+
.println(
|
| 78 |
+
"Sensitive value: '"
|
| 79 |
+
+ org.owasp
|
| 80 |
+
.esapi
|
| 81 |
+
.ESAPI
|
| 82 |
+
.encoder()
|
| 83 |
+
.encodeForHTML(new String(input))
|
| 84 |
+
+ "' encrypted and stored<br/>");
|
| 85 |
+
|
| 86 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 87 |
+
response.getWriter()
|
| 88 |
+
.println(
|
| 89 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 90 |
+
e.printStackTrace(response.getWriter());
|
| 91 |
+
throw new ServletException(e);
|
| 92 |
+
} catch (java.security.NoSuchProviderException e) {
|
| 93 |
+
response.getWriter()
|
| 94 |
+
.println(
|
| 95 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 96 |
+
e.printStackTrace(response.getWriter());
|
| 97 |
+
throw new ServletException(e);
|
| 98 |
+
} catch (javax.crypto.NoSuchPaddingException e) {
|
| 99 |
+
response.getWriter()
|
| 100 |
+
.println(
|
| 101 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 102 |
+
e.printStackTrace(response.getWriter());
|
| 103 |
+
throw new ServletException(e);
|
| 104 |
+
} catch (javax.crypto.IllegalBlockSizeException e) {
|
| 105 |
+
response.getWriter()
|
| 106 |
+
.println(
|
| 107 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 108 |
+
e.printStackTrace(response.getWriter());
|
| 109 |
+
throw new ServletException(e);
|
| 110 |
+
} catch (javax.crypto.BadPaddingException e) {
|
| 111 |
+
response.getWriter()
|
| 112 |
+
.println(
|
| 113 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 114 |
+
e.printStackTrace(response.getWriter());
|
| 115 |
+
throw new ServletException(e);
|
| 116 |
+
} catch (java.security.InvalidKeyException e) {
|
| 117 |
+
response.getWriter()
|
| 118 |
+
.println(
|
| 119 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 120 |
+
e.printStackTrace(response.getWriter());
|
| 121 |
+
throw new ServletException(e);
|
| 122 |
+
} catch (java.security.InvalidAlgorithmParameterException e) {
|
| 123 |
+
response.getWriter()
|
| 124 |
+
.println(
|
| 125 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 126 |
+
e.printStackTrace(response.getWriter());
|
| 127 |
+
throw new ServletException(e);
|
| 128 |
+
}
|
| 129 |
+
response.getWriter()
|
| 130 |
+
.println(
|
| 131 |
+
"Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
|
| 132 |
+
}
|
| 133 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00021.java
ADDED
|
@@ -0,0 +1,79 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/ldapi-00/BenchmarkTest00021")
|
| 10 |
+
public class BenchmarkTest00021 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = request.getParameter("BenchmarkTest00021");
|
| 27 |
+
if (param == null) param = "";
|
| 28 |
+
|
| 29 |
+
org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
|
| 30 |
+
try {
|
| 31 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 32 |
+
javax.naming.directory.DirContext ctx = ads.getDirContext();
|
| 33 |
+
String base = "ou=users,ou=system";
|
| 34 |
+
javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
|
| 35 |
+
sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
|
| 36 |
+
String filter = "(&(objectclass=person))(|(uid=" + param + ")(street={0}))";
|
| 37 |
+
Object[] filters = new Object[] {"The streetz 4 Ms bar"};
|
| 38 |
+
// System.out.println("Filter " + filter);
|
| 39 |
+
boolean found = false;
|
| 40 |
+
javax.naming.NamingEnumeration<javax.naming.directory.SearchResult> results =
|
| 41 |
+
ctx.search(base, filter, filters, sc);
|
| 42 |
+
while (results.hasMore()) {
|
| 43 |
+
javax.naming.directory.SearchResult sr =
|
| 44 |
+
(javax.naming.directory.SearchResult) results.next();
|
| 45 |
+
javax.naming.directory.Attributes attrs = sr.getAttributes();
|
| 46 |
+
|
| 47 |
+
javax.naming.directory.Attribute attr = attrs.get("uid");
|
| 48 |
+
javax.naming.directory.Attribute attr2 = attrs.get("street");
|
| 49 |
+
if (attr != null) {
|
| 50 |
+
response.getWriter()
|
| 51 |
+
.println(
|
| 52 |
+
"LDAP query results:<br>"
|
| 53 |
+
+ "Record found with name "
|
| 54 |
+
+ attr.get()
|
| 55 |
+
+ "<br>"
|
| 56 |
+
+ "Address: "
|
| 57 |
+
+ attr2.get()
|
| 58 |
+
+ "<br>");
|
| 59 |
+
// System.out.println("record found " + attr.get());
|
| 60 |
+
found = true;
|
| 61 |
+
}
|
| 62 |
+
}
|
| 63 |
+
if (!found) {
|
| 64 |
+
response.getWriter()
|
| 65 |
+
.println(
|
| 66 |
+
"LDAP query results: nothing found for query: "
|
| 67 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
|
| 68 |
+
}
|
| 69 |
+
} catch (javax.naming.NamingException e) {
|
| 70 |
+
throw new ServletException(e);
|
| 71 |
+
} finally {
|
| 72 |
+
try {
|
| 73 |
+
ads.closeDirContext();
|
| 74 |
+
} catch (Exception e) {
|
| 75 |
+
throw new ServletException(e);
|
| 76 |
+
}
|
| 77 |
+
}
|
| 78 |
+
}
|
| 79 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00022.java
ADDED
|
@@ -0,0 +1,78 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/hash-00/BenchmarkTest00022")
|
| 10 |
+
public class BenchmarkTest00022 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = request.getParameter("BenchmarkTest00022");
|
| 27 |
+
if (param == null) param = "";
|
| 28 |
+
|
| 29 |
+
try {
|
| 30 |
+
java.security.MessageDigest md = java.security.MessageDigest.getInstance("SHA-256");
|
| 31 |
+
byte[] input = {(byte) '?'};
|
| 32 |
+
Object inputParam = param;
|
| 33 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 34 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 35 |
+
byte[] strInput = new byte[1000];
|
| 36 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 37 |
+
if (i == -1) {
|
| 38 |
+
response.getWriter()
|
| 39 |
+
.println(
|
| 40 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 41 |
+
return;
|
| 42 |
+
}
|
| 43 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 44 |
+
}
|
| 45 |
+
md.update(input);
|
| 46 |
+
|
| 47 |
+
byte[] result = md.digest();
|
| 48 |
+
java.io.File fileTarget =
|
| 49 |
+
new java.io.File(
|
| 50 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 51 |
+
"passwordFile.txt");
|
| 52 |
+
java.io.FileWriter fw =
|
| 53 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 54 |
+
fw.write(
|
| 55 |
+
"hash_value="
|
| 56 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 57 |
+
+ "\n");
|
| 58 |
+
fw.close();
|
| 59 |
+
response.getWriter()
|
| 60 |
+
.println(
|
| 61 |
+
"Sensitive value '"
|
| 62 |
+
+ org.owasp
|
| 63 |
+
.esapi
|
| 64 |
+
.ESAPI
|
| 65 |
+
.encoder()
|
| 66 |
+
.encodeForHTML(new String(input))
|
| 67 |
+
+ "' hashed and stored<br/>");
|
| 68 |
+
|
| 69 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 70 |
+
System.out.println("Problem executing hash - TestCase");
|
| 71 |
+
throw new ServletException(e);
|
| 72 |
+
}
|
| 73 |
+
|
| 74 |
+
response.getWriter()
|
| 75 |
+
.println(
|
| 76 |
+
"Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
|
| 77 |
+
}
|
| 78 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00023.java
ADDED
|
@@ -0,0 +1,78 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/weakrand-00/BenchmarkTest00023")
|
| 10 |
+
public class BenchmarkTest00023 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = request.getParameter("BenchmarkTest00023");
|
| 27 |
+
if (param == null) param = "";
|
| 28 |
+
|
| 29 |
+
float rand = new java.util.Random().nextFloat();
|
| 30 |
+
String rememberMeKey = Float.toString(rand).substring(2); // Trim off the 0. at the front.
|
| 31 |
+
|
| 32 |
+
String user = "Floyd";
|
| 33 |
+
String fullClassName = this.getClass().getName();
|
| 34 |
+
String testCaseNumber =
|
| 35 |
+
fullClassName.substring(
|
| 36 |
+
fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
|
| 37 |
+
user += testCaseNumber;
|
| 38 |
+
|
| 39 |
+
String cookieName = "rememberMe" + testCaseNumber;
|
| 40 |
+
|
| 41 |
+
boolean foundUser = false;
|
| 42 |
+
javax.servlet.http.Cookie[] cookies = request.getCookies();
|
| 43 |
+
if (cookies != null) {
|
| 44 |
+
for (int i = 0; !foundUser && i < cookies.length; i++) {
|
| 45 |
+
javax.servlet.http.Cookie cookie = cookies[i];
|
| 46 |
+
if (cookieName.equals(cookie.getName())) {
|
| 47 |
+
if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
|
| 48 |
+
foundUser = true;
|
| 49 |
+
}
|
| 50 |
+
}
|
| 51 |
+
}
|
| 52 |
+
}
|
| 53 |
+
|
| 54 |
+
if (foundUser) {
|
| 55 |
+
response.getWriter().println("Welcome back: " + user + "<br/>");
|
| 56 |
+
} else {
|
| 57 |
+
javax.servlet.http.Cookie rememberMe =
|
| 58 |
+
new javax.servlet.http.Cookie(cookieName, rememberMeKey);
|
| 59 |
+
rememberMe.setSecure(true);
|
| 60 |
+
rememberMe.setHttpOnly(true);
|
| 61 |
+
rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
|
| 62 |
+
rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
|
| 63 |
+
// e.g., /benchmark/sql-01/BenchmarkTest01001
|
| 64 |
+
request.getSession().setAttribute(cookieName, rememberMeKey);
|
| 65 |
+
response.addCookie(rememberMe);
|
| 66 |
+
response.getWriter()
|
| 67 |
+
.println(
|
| 68 |
+
user
|
| 69 |
+
+ " has been remembered with cookie: "
|
| 70 |
+
+ rememberMe.getName()
|
| 71 |
+
+ " whose value is: "
|
| 72 |
+
+ rememberMe.getValue()
|
| 73 |
+
+ "<br/>");
|
| 74 |
+
}
|
| 75 |
+
|
| 76 |
+
response.getWriter().println("Weak Randomness Test java.util.Random.nextFloat() executed");
|
| 77 |
+
}
|
| 78 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00024.java
ADDED
|
@@ -0,0 +1,50 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00024")
|
| 10 |
+
public class BenchmarkTest00024 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = request.getParameter("BenchmarkTest00024");
|
| 27 |
+
if (param == null) param = "";
|
| 28 |
+
|
| 29 |
+
String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + param + "'";
|
| 30 |
+
|
| 31 |
+
try {
|
| 32 |
+
java.sql.Connection connection =
|
| 33 |
+
org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
|
| 34 |
+
java.sql.PreparedStatement statement =
|
| 35 |
+
connection.prepareStatement(
|
| 36 |
+
sql,
|
| 37 |
+
java.sql.ResultSet.TYPE_FORWARD_ONLY,
|
| 38 |
+
java.sql.ResultSet.CONCUR_READ_ONLY,
|
| 39 |
+
java.sql.ResultSet.CLOSE_CURSORS_AT_COMMIT);
|
| 40 |
+
statement.setString(1, "foo");
|
| 41 |
+
statement.execute();
|
| 42 |
+
org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
|
| 43 |
+
} catch (java.sql.SQLException e) {
|
| 44 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 45 |
+
response.getWriter().println("Error processing request.");
|
| 46 |
+
return;
|
| 47 |
+
} else throw new ServletException(e);
|
| 48 |
+
}
|
| 49 |
+
}
|
| 50 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00025.java
ADDED
|
@@ -0,0 +1,48 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00025")
|
| 10 |
+
public class BenchmarkTest00025 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = request.getParameter("BenchmarkTest00025");
|
| 27 |
+
if (param == null) param = "";
|
| 28 |
+
|
| 29 |
+
String sql = "SELECT userid from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
|
| 30 |
+
try {
|
| 31 |
+
// Long results =
|
| 32 |
+
// org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForLong(sql);
|
| 33 |
+
Long results =
|
| 34 |
+
org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForObject(
|
| 35 |
+
sql, Long.class);
|
| 36 |
+
response.getWriter().println("Your results are: " + String.valueOf(results));
|
| 37 |
+
} catch (org.springframework.dao.EmptyResultDataAccessException e) {
|
| 38 |
+
response.getWriter()
|
| 39 |
+
.println(
|
| 40 |
+
"No results returned for query: "
|
| 41 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
|
| 42 |
+
} catch (org.springframework.dao.DataAccessException e) {
|
| 43 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 44 |
+
response.getWriter().println("Error processing request.");
|
| 45 |
+
} else throw new ServletException(e);
|
| 46 |
+
}
|
| 47 |
+
}
|
| 48 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00026.java
ADDED
|
@@ -0,0 +1,58 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00026")
|
| 10 |
+
public class BenchmarkTest00026 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = request.getParameter("BenchmarkTest00026");
|
| 27 |
+
if (param == null) param = "";
|
| 28 |
+
|
| 29 |
+
String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
|
| 30 |
+
try {
|
| 31 |
+
org.springframework.jdbc.support.rowset.SqlRowSet results =
|
| 32 |
+
org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForRowSet(sql);
|
| 33 |
+
response.getWriter().println("Your results are: ");
|
| 34 |
+
|
| 35 |
+
// System.out.println("Your results are");
|
| 36 |
+
while (results.next()) {
|
| 37 |
+
response.getWriter()
|
| 38 |
+
.println(
|
| 39 |
+
org.owasp
|
| 40 |
+
.esapi
|
| 41 |
+
.ESAPI
|
| 42 |
+
.encoder()
|
| 43 |
+
.encodeForHTML(results.getString("USERNAME"))
|
| 44 |
+
+ " ");
|
| 45 |
+
// System.out.println(results.getString("USERNAME"));
|
| 46 |
+
}
|
| 47 |
+
} catch (org.springframework.dao.EmptyResultDataAccessException e) {
|
| 48 |
+
response.getWriter()
|
| 49 |
+
.println(
|
| 50 |
+
"No results returned for query: "
|
| 51 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
|
| 52 |
+
} catch (org.springframework.dao.DataAccessException e) {
|
| 53 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 54 |
+
response.getWriter().println("Error processing request.");
|
| 55 |
+
} else throw new ServletException(e);
|
| 56 |
+
}
|
| 57 |
+
}
|
| 58 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00027.java
ADDED
|
@@ -0,0 +1,43 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00027")
|
| 10 |
+
public class BenchmarkTest00027 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = request.getParameter("BenchmarkTest00027");
|
| 27 |
+
if (param == null) param = "";
|
| 28 |
+
|
| 29 |
+
String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
|
| 30 |
+
|
| 31 |
+
try {
|
| 32 |
+
java.sql.Statement statement =
|
| 33 |
+
org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
|
| 34 |
+
int count = statement.executeUpdate(sql);
|
| 35 |
+
org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
|
| 36 |
+
} catch (java.sql.SQLException e) {
|
| 37 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 38 |
+
response.getWriter().println("Error processing request.");
|
| 39 |
+
return;
|
| 40 |
+
} else throw new ServletException(e);
|
| 41 |
+
}
|
| 42 |
+
}
|
| 43 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00028.java
ADDED
|
@@ -0,0 +1,59 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/pathtraver-00/BenchmarkTest00028")
|
| 10 |
+
public class BenchmarkTest00028 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
java.util.Map<String, String[]> map = request.getParameterMap();
|
| 27 |
+
String param = "";
|
| 28 |
+
if (!map.isEmpty()) {
|
| 29 |
+
String[] values = map.get("BenchmarkTest00028");
|
| 30 |
+
if (values != null) param = values[0];
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
String fileName = null;
|
| 34 |
+
java.io.FileOutputStream fos = null;
|
| 35 |
+
|
| 36 |
+
try {
|
| 37 |
+
fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
|
| 38 |
+
|
| 39 |
+
fos = new java.io.FileOutputStream(fileName, false);
|
| 40 |
+
response.getWriter()
|
| 41 |
+
.println(
|
| 42 |
+
"Now ready to write to file: "
|
| 43 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
|
| 44 |
+
|
| 45 |
+
} catch (Exception e) {
|
| 46 |
+
System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
|
| 47 |
+
// System.out.println("File exception caught and swallowed: " + e.getMessage());
|
| 48 |
+
} finally {
|
| 49 |
+
if (fos != null) {
|
| 50 |
+
try {
|
| 51 |
+
fos.close();
|
| 52 |
+
fos = null;
|
| 53 |
+
} catch (Exception e) {
|
| 54 |
+
// we tried...
|
| 55 |
+
}
|
| 56 |
+
}
|
| 57 |
+
}
|
| 58 |
+
}
|
| 59 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00029.java
ADDED
|
@@ -0,0 +1,86 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/hash-00/BenchmarkTest00029")
|
| 10 |
+
public class BenchmarkTest00029 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
java.util.Map<String, String[]> map = request.getParameterMap();
|
| 27 |
+
String param = "";
|
| 28 |
+
if (!map.isEmpty()) {
|
| 29 |
+
String[] values = map.get("BenchmarkTest00029");
|
| 30 |
+
if (values != null) param = values[0];
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
try {
|
| 34 |
+
java.util.Properties benchmarkprops = new java.util.Properties();
|
| 35 |
+
benchmarkprops.load(
|
| 36 |
+
this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
|
| 37 |
+
String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
|
| 38 |
+
java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
|
| 39 |
+
byte[] input = {(byte) '?'};
|
| 40 |
+
Object inputParam = param;
|
| 41 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 42 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 43 |
+
byte[] strInput = new byte[1000];
|
| 44 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 45 |
+
if (i == -1) {
|
| 46 |
+
response.getWriter()
|
| 47 |
+
.println(
|
| 48 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 49 |
+
return;
|
| 50 |
+
}
|
| 51 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 52 |
+
}
|
| 53 |
+
md.update(input);
|
| 54 |
+
|
| 55 |
+
byte[] result = md.digest();
|
| 56 |
+
java.io.File fileTarget =
|
| 57 |
+
new java.io.File(
|
| 58 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 59 |
+
"passwordFile.txt");
|
| 60 |
+
java.io.FileWriter fw =
|
| 61 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 62 |
+
fw.write(
|
| 63 |
+
"hash_value="
|
| 64 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 65 |
+
+ "\n");
|
| 66 |
+
fw.close();
|
| 67 |
+
response.getWriter()
|
| 68 |
+
.println(
|
| 69 |
+
"Sensitive value '"
|
| 70 |
+
+ org.owasp
|
| 71 |
+
.esapi
|
| 72 |
+
.ESAPI
|
| 73 |
+
.encoder()
|
| 74 |
+
.encodeForHTML(new String(input))
|
| 75 |
+
+ "' hashed and stored<br/>");
|
| 76 |
+
|
| 77 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 78 |
+
System.out.println("Problem executing hash - TestCase");
|
| 79 |
+
throw new ServletException(e);
|
| 80 |
+
}
|
| 81 |
+
|
| 82 |
+
response.getWriter()
|
| 83 |
+
.println(
|
| 84 |
+
"Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
|
| 85 |
+
}
|
| 86 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00030.java
ADDED
|
@@ -0,0 +1,37 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/xss-00/BenchmarkTest00030")
|
| 10 |
+
public class BenchmarkTest00030 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
java.util.Map<String, String[]> map = request.getParameterMap();
|
| 27 |
+
String param = "";
|
| 28 |
+
if (!map.isEmpty()) {
|
| 29 |
+
String[] values = map.get("BenchmarkTest00030");
|
| 30 |
+
if (values != null) param = values[0];
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
response.setHeader("X-XSS-Protection", "0");
|
| 34 |
+
Object[] obj = {"a", "b"};
|
| 35 |
+
response.getWriter().printf(param, obj);
|
| 36 |
+
}
|
| 37 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00031.java
ADDED
|
@@ -0,0 +1,42 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/trustbound-00/BenchmarkTest00031")
|
| 10 |
+
public class BenchmarkTest00031 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
java.util.Map<String, String[]> map = request.getParameterMap();
|
| 27 |
+
String param = "";
|
| 28 |
+
if (!map.isEmpty()) {
|
| 29 |
+
String[] values = map.get("BenchmarkTest00031");
|
| 30 |
+
if (values != null) param = values[0];
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
// javax.servlet.http.HttpSession.putValue(java.lang.String,java.lang.Object^)
|
| 34 |
+
request.getSession().putValue("userid", param);
|
| 35 |
+
|
| 36 |
+
response.getWriter()
|
| 37 |
+
.println(
|
| 38 |
+
"Item: 'userid' with value: '"
|
| 39 |
+
+ org.owasp.benchmark.helpers.Utils.encodeForHTML(param)
|
| 40 |
+
+ "' saved in session.");
|
| 41 |
+
}
|
| 42 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00032.java
ADDED
|
@@ -0,0 +1,50 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00032")
|
| 10 |
+
public class BenchmarkTest00032 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
java.util.Map<String, String[]> map = request.getParameterMap();
|
| 27 |
+
String param = "";
|
| 28 |
+
if (!map.isEmpty()) {
|
| 29 |
+
String[] values = map.get("BenchmarkTest00032");
|
| 30 |
+
if (values != null) param = values[0];
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
try {
|
| 34 |
+
String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
|
| 35 |
+
|
| 36 |
+
org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.execute(sql);
|
| 37 |
+
response.getWriter()
|
| 38 |
+
.println(
|
| 39 |
+
"No results can be displayed for query: "
|
| 40 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
|
| 41 |
+
+ "<br>"
|
| 42 |
+
+ " because the Spring execute method doesn't return results.");
|
| 43 |
+
|
| 44 |
+
} catch (org.springframework.dao.DataAccessException e) {
|
| 45 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 46 |
+
response.getWriter().println("Error processing request.");
|
| 47 |
+
} else throw new ServletException(e);
|
| 48 |
+
}
|
| 49 |
+
}
|
| 50 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00033.java
ADDED
|
@@ -0,0 +1,62 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00033")
|
| 10 |
+
public class BenchmarkTest00033 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
java.util.Map<String, String[]> map = request.getParameterMap();
|
| 27 |
+
String param = "";
|
| 28 |
+
if (!map.isEmpty()) {
|
| 29 |
+
String[] values = map.get("BenchmarkTest00033");
|
| 30 |
+
if (values != null) param = values[0];
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
|
| 34 |
+
try {
|
| 35 |
+
org.springframework.jdbc.support.rowset.SqlRowSet results =
|
| 36 |
+
org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForRowSet(sql);
|
| 37 |
+
response.getWriter().println("Your results are: ");
|
| 38 |
+
|
| 39 |
+
// System.out.println("Your results are");
|
| 40 |
+
while (results.next()) {
|
| 41 |
+
response.getWriter()
|
| 42 |
+
.println(
|
| 43 |
+
org.owasp
|
| 44 |
+
.esapi
|
| 45 |
+
.ESAPI
|
| 46 |
+
.encoder()
|
| 47 |
+
.encodeForHTML(results.getString("USERNAME"))
|
| 48 |
+
+ " ");
|
| 49 |
+
// System.out.println(results.getString("USERNAME"));
|
| 50 |
+
}
|
| 51 |
+
} catch (org.springframework.dao.EmptyResultDataAccessException e) {
|
| 52 |
+
response.getWriter()
|
| 53 |
+
.println(
|
| 54 |
+
"No results returned for query: "
|
| 55 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
|
| 56 |
+
} catch (org.springframework.dao.DataAccessException e) {
|
| 57 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 58 |
+
response.getWriter().println("Error processing request.");
|
| 59 |
+
} else throw new ServletException(e);
|
| 60 |
+
}
|
| 61 |
+
}
|
| 62 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00034.java
ADDED
|
@@ -0,0 +1,47 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00034")
|
| 10 |
+
public class BenchmarkTest00034 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
java.util.Map<String, String[]> map = request.getParameterMap();
|
| 27 |
+
String param = "";
|
| 28 |
+
if (!map.isEmpty()) {
|
| 29 |
+
String[] values = map.get("BenchmarkTest00034");
|
| 30 |
+
if (values != null) param = values[0];
|
| 31 |
+
}
|
| 32 |
+
|
| 33 |
+
String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
|
| 34 |
+
|
| 35 |
+
try {
|
| 36 |
+
java.sql.Statement statement =
|
| 37 |
+
org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
|
| 38 |
+
statement.execute(sql, java.sql.Statement.RETURN_GENERATED_KEYS);
|
| 39 |
+
org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
|
| 40 |
+
} catch (java.sql.SQLException e) {
|
| 41 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 42 |
+
response.getWriter().println("Error processing request.");
|
| 43 |
+
return;
|
| 44 |
+
} else throw new ServletException(e);
|
| 45 |
+
}
|
| 46 |
+
}
|
| 47 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00035.java
ADDED
|
@@ -0,0 +1,104 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/crypto-00/BenchmarkTest00035")
|
| 10 |
+
public class BenchmarkTest00035 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
boolean flag = true;
|
| 28 |
+
java.util.Enumeration<String> names = request.getParameterNames();
|
| 29 |
+
while (names.hasMoreElements() && flag) {
|
| 30 |
+
String name = (String) names.nextElement();
|
| 31 |
+
String[] values = request.getParameterValues(name);
|
| 32 |
+
if (values != null) {
|
| 33 |
+
for (int i = 0; i < values.length && flag; i++) {
|
| 34 |
+
String value = values[i];
|
| 35 |
+
if (value.equals("BenchmarkTest00035")) {
|
| 36 |
+
param = name;
|
| 37 |
+
flag = false;
|
| 38 |
+
}
|
| 39 |
+
}
|
| 40 |
+
}
|
| 41 |
+
}
|
| 42 |
+
|
| 43 |
+
try {
|
| 44 |
+
java.util.Properties benchmarkprops = new java.util.Properties();
|
| 45 |
+
benchmarkprops.load(
|
| 46 |
+
this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
|
| 47 |
+
String algorithm = benchmarkprops.getProperty("cryptoAlg1", "DESede/ECB/PKCS5Padding");
|
| 48 |
+
javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
|
| 49 |
+
|
| 50 |
+
// Prepare the cipher to encrypt
|
| 51 |
+
javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
|
| 52 |
+
c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
|
| 53 |
+
|
| 54 |
+
// encrypt and store the results
|
| 55 |
+
byte[] input = {(byte) '?'};
|
| 56 |
+
Object inputParam = param;
|
| 57 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 58 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 59 |
+
byte[] strInput = new byte[1000];
|
| 60 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 61 |
+
if (i == -1) {
|
| 62 |
+
response.getWriter()
|
| 63 |
+
.println(
|
| 64 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 65 |
+
return;
|
| 66 |
+
}
|
| 67 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 68 |
+
}
|
| 69 |
+
byte[] result = c.doFinal(input);
|
| 70 |
+
|
| 71 |
+
java.io.File fileTarget =
|
| 72 |
+
new java.io.File(
|
| 73 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 74 |
+
"passwordFile.txt");
|
| 75 |
+
java.io.FileWriter fw =
|
| 76 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 77 |
+
fw.write(
|
| 78 |
+
"secret_value="
|
| 79 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 80 |
+
+ "\n");
|
| 81 |
+
fw.close();
|
| 82 |
+
response.getWriter()
|
| 83 |
+
.println(
|
| 84 |
+
"Sensitive value: '"
|
| 85 |
+
+ org.owasp
|
| 86 |
+
.esapi
|
| 87 |
+
.ESAPI
|
| 88 |
+
.encoder()
|
| 89 |
+
.encodeForHTML(new String(input))
|
| 90 |
+
+ "' encrypted and stored<br/>");
|
| 91 |
+
|
| 92 |
+
} catch (java.security.NoSuchAlgorithmException
|
| 93 |
+
| javax.crypto.NoSuchPaddingException
|
| 94 |
+
| javax.crypto.IllegalBlockSizeException
|
| 95 |
+
| javax.crypto.BadPaddingException
|
| 96 |
+
| java.security.InvalidKeyException e) {
|
| 97 |
+
response.getWriter()
|
| 98 |
+
.println(
|
| 99 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 100 |
+
e.printStackTrace(response.getWriter());
|
| 101 |
+
throw new ServletException(e);
|
| 102 |
+
}
|
| 103 |
+
}
|
| 104 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00036.java
ADDED
|
@@ -0,0 +1,50 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/xss-00/BenchmarkTest00036")
|
| 10 |
+
public class BenchmarkTest00036 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
boolean flag = true;
|
| 28 |
+
java.util.Enumeration<String> names = request.getParameterNames();
|
| 29 |
+
while (names.hasMoreElements() && flag) {
|
| 30 |
+
String name = (String) names.nextElement();
|
| 31 |
+
String[] values = request.getParameterValues(name);
|
| 32 |
+
if (values != null) {
|
| 33 |
+
for (int i = 0; i < values.length && flag; i++) {
|
| 34 |
+
String value = values[i];
|
| 35 |
+
if (value.equals("BenchmarkTest00036")) {
|
| 36 |
+
param = name;
|
| 37 |
+
flag = false;
|
| 38 |
+
}
|
| 39 |
+
}
|
| 40 |
+
}
|
| 41 |
+
}
|
| 42 |
+
|
| 43 |
+
response.setHeader("X-XSS-Protection", "0");
|
| 44 |
+
int length = 1;
|
| 45 |
+
if (param != null) {
|
| 46 |
+
length = param.length();
|
| 47 |
+
response.getWriter().write(param.toCharArray(), 0, length);
|
| 48 |
+
}
|
| 49 |
+
}
|
| 50 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00037.java
ADDED
|
@@ -0,0 +1,64 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00037")
|
| 10 |
+
public class BenchmarkTest00037 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
boolean flag = true;
|
| 28 |
+
java.util.Enumeration<String> names = request.getParameterNames();
|
| 29 |
+
while (names.hasMoreElements() && flag) {
|
| 30 |
+
String name = (String) names.nextElement();
|
| 31 |
+
String[] values = request.getParameterValues(name);
|
| 32 |
+
if (values != null) {
|
| 33 |
+
for (int i = 0; i < values.length && flag; i++) {
|
| 34 |
+
String value = values[i];
|
| 35 |
+
if (value.equals("BenchmarkTest00037")) {
|
| 36 |
+
param = name;
|
| 37 |
+
flag = false;
|
| 38 |
+
}
|
| 39 |
+
}
|
| 40 |
+
}
|
| 41 |
+
}
|
| 42 |
+
|
| 43 |
+
String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + param + "'";
|
| 44 |
+
|
| 45 |
+
try {
|
| 46 |
+
java.sql.Connection connection =
|
| 47 |
+
org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
|
| 48 |
+
java.sql.PreparedStatement statement =
|
| 49 |
+
connection.prepareStatement(
|
| 50 |
+
sql,
|
| 51 |
+
java.sql.ResultSet.TYPE_FORWARD_ONLY,
|
| 52 |
+
java.sql.ResultSet.CONCUR_READ_ONLY,
|
| 53 |
+
java.sql.ResultSet.CLOSE_CURSORS_AT_COMMIT);
|
| 54 |
+
statement.setString(1, "foo");
|
| 55 |
+
statement.execute();
|
| 56 |
+
org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
|
| 57 |
+
} catch (java.sql.SQLException e) {
|
| 58 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 59 |
+
response.getWriter().println("Error processing request.");
|
| 60 |
+
return;
|
| 61 |
+
} else throw new ServletException(e);
|
| 62 |
+
}
|
| 63 |
+
}
|
| 64 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00038.java
ADDED
|
@@ -0,0 +1,79 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00038")
|
| 10 |
+
public class BenchmarkTest00038 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
boolean flag = true;
|
| 28 |
+
java.util.Enumeration<String> names = request.getParameterNames();
|
| 29 |
+
while (names.hasMoreElements() && flag) {
|
| 30 |
+
String name = (String) names.nextElement();
|
| 31 |
+
String[] values = request.getParameterValues(name);
|
| 32 |
+
if (values != null) {
|
| 33 |
+
for (int i = 0; i < values.length && flag; i++) {
|
| 34 |
+
String value = values[i];
|
| 35 |
+
if (value.equals("BenchmarkTest00038")) {
|
| 36 |
+
param = name;
|
| 37 |
+
flag = false;
|
| 38 |
+
}
|
| 39 |
+
}
|
| 40 |
+
}
|
| 41 |
+
}
|
| 42 |
+
|
| 43 |
+
String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
|
| 44 |
+
try {
|
| 45 |
+
java.util.List<String> results =
|
| 46 |
+
org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.query(
|
| 47 |
+
sql,
|
| 48 |
+
new org.springframework.jdbc.core.RowMapper<String>() {
|
| 49 |
+
@Override
|
| 50 |
+
public String mapRow(java.sql.ResultSet rs, int rowNum)
|
| 51 |
+
throws java.sql.SQLException {
|
| 52 |
+
try {
|
| 53 |
+
return rs.getString("USERNAME");
|
| 54 |
+
} catch (java.sql.SQLException e) {
|
| 55 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper
|
| 56 |
+
.hideSQLErrors) {
|
| 57 |
+
return "Error processing query.";
|
| 58 |
+
} else throw e;
|
| 59 |
+
}
|
| 60 |
+
}
|
| 61 |
+
});
|
| 62 |
+
response.getWriter().println("Your results are: ");
|
| 63 |
+
|
| 64 |
+
for (String s : results) {
|
| 65 |
+
response.getWriter()
|
| 66 |
+
.println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(s) + "<br>");
|
| 67 |
+
}
|
| 68 |
+
} catch (org.springframework.dao.EmptyResultDataAccessException e) {
|
| 69 |
+
response.getWriter()
|
| 70 |
+
.println(
|
| 71 |
+
"No results returned for query: "
|
| 72 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
|
| 73 |
+
} catch (org.springframework.dao.DataAccessException e) {
|
| 74 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 75 |
+
response.getWriter().println("Error processing request.");
|
| 76 |
+
} else throw new ServletException(e);
|
| 77 |
+
}
|
| 78 |
+
}
|
| 79 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00039.java
ADDED
|
@@ -0,0 +1,65 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00039")
|
| 10 |
+
public class BenchmarkTest00039 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String param = "";
|
| 27 |
+
boolean flag = true;
|
| 28 |
+
java.util.Enumeration<String> names = request.getParameterNames();
|
| 29 |
+
while (names.hasMoreElements() && flag) {
|
| 30 |
+
String name = (String) names.nextElement();
|
| 31 |
+
String[] values = request.getParameterValues(name);
|
| 32 |
+
if (values != null) {
|
| 33 |
+
for (int i = 0; i < values.length && flag; i++) {
|
| 34 |
+
String value = values[i];
|
| 35 |
+
if (value.equals("BenchmarkTest00039")) {
|
| 36 |
+
param = name;
|
| 37 |
+
flag = false;
|
| 38 |
+
}
|
| 39 |
+
}
|
| 40 |
+
}
|
| 41 |
+
}
|
| 42 |
+
|
| 43 |
+
String sql =
|
| 44 |
+
"SELECT TOP 1 userid from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
|
| 45 |
+
try {
|
| 46 |
+
java.util.Map<String, Object> results =
|
| 47 |
+
org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForMap(sql);
|
| 48 |
+
response.getWriter().println("Your results are: ");
|
| 49 |
+
|
| 50 |
+
// System.out.println("Your results are");
|
| 51 |
+
response.getWriter()
|
| 52 |
+
.println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(results.toString()));
|
| 53 |
+
// System.out.println(results.toString());
|
| 54 |
+
} catch (org.springframework.dao.EmptyResultDataAccessException e) {
|
| 55 |
+
response.getWriter()
|
| 56 |
+
.println(
|
| 57 |
+
"No results returned for query: "
|
| 58 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
|
| 59 |
+
} catch (org.springframework.dao.DataAccessException e) {
|
| 60 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 61 |
+
response.getWriter().println("Error processing request.");
|
| 62 |
+
} else throw new ServletException(e);
|
| 63 |
+
}
|
| 64 |
+
}
|
| 65 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00040.java
ADDED
|
@@ -0,0 +1,47 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/pathtraver-00/BenchmarkTest00040")
|
| 10 |
+
public class BenchmarkTest00040 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
org.owasp.benchmark.helpers.SeparateClassRequest scr =
|
| 27 |
+
new org.owasp.benchmark.helpers.SeparateClassRequest(request);
|
| 28 |
+
String param = scr.getTheParameter("BenchmarkTest00040");
|
| 29 |
+
if (param == null) param = "";
|
| 30 |
+
|
| 31 |
+
java.io.File fileTarget = new java.io.File(param);
|
| 32 |
+
response.getWriter()
|
| 33 |
+
.println(
|
| 34 |
+
"Access to file: '"
|
| 35 |
+
+ org.owasp
|
| 36 |
+
.esapi
|
| 37 |
+
.ESAPI
|
| 38 |
+
.encoder()
|
| 39 |
+
.encodeForHTML(fileTarget.toString())
|
| 40 |
+
+ "' created.");
|
| 41 |
+
if (fileTarget.exists()) {
|
| 42 |
+
response.getWriter().println(" And file already exists.");
|
| 43 |
+
} else {
|
| 44 |
+
response.getWriter().println(" But file doesn't exist yet.");
|
| 45 |
+
}
|
| 46 |
+
}
|
| 47 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00041.java
ADDED
|
@@ -0,0 +1,38 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/xss-00/BenchmarkTest00041")
|
| 10 |
+
public class BenchmarkTest00041 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
org.owasp.benchmark.helpers.SeparateClassRequest scr =
|
| 27 |
+
new org.owasp.benchmark.helpers.SeparateClassRequest(request);
|
| 28 |
+
String param = scr.getTheParameter("BenchmarkTest00041");
|
| 29 |
+
if (param == null) param = "";
|
| 30 |
+
|
| 31 |
+
response.setHeader("X-XSS-Protection", "0");
|
| 32 |
+
int length = 1;
|
| 33 |
+
if (param != null) {
|
| 34 |
+
length = param.length();
|
| 35 |
+
response.getWriter().write(param, 0, length);
|
| 36 |
+
}
|
| 37 |
+
}
|
| 38 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00042.java
ADDED
|
@@ -0,0 +1,85 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/weakrand-00/BenchmarkTest00042")
|
| 10 |
+
public class BenchmarkTest00042 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
org.owasp.benchmark.helpers.SeparateClassRequest scr =
|
| 27 |
+
new org.owasp.benchmark.helpers.SeparateClassRequest(request);
|
| 28 |
+
String param = scr.getTheParameter("BenchmarkTest00042");
|
| 29 |
+
if (param == null) param = "";
|
| 30 |
+
|
| 31 |
+
try {
|
| 32 |
+
int r = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt();
|
| 33 |
+
String rememberMeKey = Integer.toString(r);
|
| 34 |
+
|
| 35 |
+
String user = "SafeIngrid";
|
| 36 |
+
String fullClassName = this.getClass().getName();
|
| 37 |
+
String testCaseNumber =
|
| 38 |
+
fullClassName.substring(
|
| 39 |
+
fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
|
| 40 |
+
user += testCaseNumber;
|
| 41 |
+
|
| 42 |
+
String cookieName = "rememberMe" + testCaseNumber;
|
| 43 |
+
|
| 44 |
+
boolean foundUser = false;
|
| 45 |
+
javax.servlet.http.Cookie[] cookies = request.getCookies();
|
| 46 |
+
if (cookies != null) {
|
| 47 |
+
for (int i = 0; !foundUser && i < cookies.length; i++) {
|
| 48 |
+
javax.servlet.http.Cookie cookie = cookies[i];
|
| 49 |
+
if (cookieName.equals(cookie.getName())) {
|
| 50 |
+
if (cookie.getValue()
|
| 51 |
+
.equals(request.getSession().getAttribute(cookieName))) {
|
| 52 |
+
foundUser = true;
|
| 53 |
+
}
|
| 54 |
+
}
|
| 55 |
+
}
|
| 56 |
+
}
|
| 57 |
+
|
| 58 |
+
if (foundUser) {
|
| 59 |
+
response.getWriter().println("Welcome back: " + user + "<br/>");
|
| 60 |
+
} else {
|
| 61 |
+
javax.servlet.http.Cookie rememberMe =
|
| 62 |
+
new javax.servlet.http.Cookie(cookieName, rememberMeKey);
|
| 63 |
+
rememberMe.setSecure(true);
|
| 64 |
+
rememberMe.setHttpOnly(true);
|
| 65 |
+
rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
|
| 66 |
+
// e.g., /benchmark/sql-01/BenchmarkTest01001
|
| 67 |
+
request.getSession().setAttribute(cookieName, rememberMeKey);
|
| 68 |
+
response.addCookie(rememberMe);
|
| 69 |
+
response.getWriter()
|
| 70 |
+
.println(
|
| 71 |
+
user
|
| 72 |
+
+ " has been remembered with cookie: "
|
| 73 |
+
+ rememberMe.getName()
|
| 74 |
+
+ " whose value is: "
|
| 75 |
+
+ rememberMe.getValue()
|
| 76 |
+
+ "<br/>");
|
| 77 |
+
}
|
| 78 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 79 |
+
System.out.println("Problem executing SecureRandom.nextInt() - TestCase");
|
| 80 |
+
throw new ServletException(e);
|
| 81 |
+
}
|
| 82 |
+
response.getWriter()
|
| 83 |
+
.println("Weak Randomness Test java.security.SecureRandom.nextInt() executed");
|
| 84 |
+
}
|
| 85 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00043.java
ADDED
|
@@ -0,0 +1,45 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/sqli-00/BenchmarkTest00043")
|
| 10 |
+
public class BenchmarkTest00043 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
org.owasp.benchmark.helpers.SeparateClassRequest scr =
|
| 27 |
+
new org.owasp.benchmark.helpers.SeparateClassRequest(request);
|
| 28 |
+
String param = scr.getTheParameter("BenchmarkTest00043");
|
| 29 |
+
if (param == null) param = "";
|
| 30 |
+
|
| 31 |
+
String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
|
| 32 |
+
|
| 33 |
+
try {
|
| 34 |
+
java.sql.Statement statement =
|
| 35 |
+
org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
|
| 36 |
+
int count = statement.executeUpdate(sql, new int[] {1, 2});
|
| 37 |
+
org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
|
| 38 |
+
} catch (java.sql.SQLException e) {
|
| 39 |
+
if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
|
| 40 |
+
response.getWriter().println("Error processing request.");
|
| 41 |
+
return;
|
| 42 |
+
} else throw new ServletException(e);
|
| 43 |
+
}
|
| 44 |
+
}
|
| 45 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00044.java
ADDED
|
@@ -0,0 +1,80 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/ldapi-00/BenchmarkTest00044")
|
| 10 |
+
public class BenchmarkTest00044 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String[] values = request.getParameterValues("BenchmarkTest00044");
|
| 27 |
+
String param;
|
| 28 |
+
if (values != null && values.length > 0) param = values[0];
|
| 29 |
+
else param = "";
|
| 30 |
+
|
| 31 |
+
org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
|
| 32 |
+
try {
|
| 33 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 34 |
+
javax.naming.directory.DirContext ctx = ads.getDirContext();
|
| 35 |
+
String base = "ou=users,ou=system";
|
| 36 |
+
javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
|
| 37 |
+
sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
|
| 38 |
+
String filter = "(&(objectclass=person)(uid=" + param + "))";
|
| 39 |
+
// System.out.println("Filter " + filter);
|
| 40 |
+
boolean found = false;
|
| 41 |
+
javax.naming.NamingEnumeration<javax.naming.directory.SearchResult> results =
|
| 42 |
+
ctx.search(base, filter, sc);
|
| 43 |
+
while (results.hasMore()) {
|
| 44 |
+
javax.naming.directory.SearchResult sr =
|
| 45 |
+
(javax.naming.directory.SearchResult) results.next();
|
| 46 |
+
javax.naming.directory.Attributes attrs = sr.getAttributes();
|
| 47 |
+
|
| 48 |
+
javax.naming.directory.Attribute attr = attrs.get("uid");
|
| 49 |
+
javax.naming.directory.Attribute attr2 = attrs.get("street");
|
| 50 |
+
if (attr != null) {
|
| 51 |
+
response.getWriter()
|
| 52 |
+
.println(
|
| 53 |
+
"LDAP query results:<br>"
|
| 54 |
+
+ "Record found with name "
|
| 55 |
+
+ attr.get()
|
| 56 |
+
+ "<br>"
|
| 57 |
+
+ "Address: "
|
| 58 |
+
+ attr2.get()
|
| 59 |
+
+ "<br>");
|
| 60 |
+
// System.out.println("record found " + attr.get());
|
| 61 |
+
found = true;
|
| 62 |
+
}
|
| 63 |
+
}
|
| 64 |
+
if (!found) {
|
| 65 |
+
response.getWriter()
|
| 66 |
+
.println(
|
| 67 |
+
"LDAP query results: nothing found for query: "
|
| 68 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
|
| 69 |
+
}
|
| 70 |
+
} catch (javax.naming.NamingException e) {
|
| 71 |
+
throw new ServletException(e);
|
| 72 |
+
} finally {
|
| 73 |
+
try {
|
| 74 |
+
ads.closeDirContext();
|
| 75 |
+
} catch (Exception e) {
|
| 76 |
+
throw new ServletException(e);
|
| 77 |
+
}
|
| 78 |
+
}
|
| 79 |
+
}
|
| 80 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00045.java
ADDED
|
@@ -0,0 +1,54 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/pathtraver-00/BenchmarkTest00045")
|
| 10 |
+
public class BenchmarkTest00045 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String[] values = request.getParameterValues("BenchmarkTest00045");
|
| 27 |
+
String param;
|
| 28 |
+
if (values != null && values.length > 0) param = values[0];
|
| 29 |
+
else param = "";
|
| 30 |
+
|
| 31 |
+
String fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
|
| 32 |
+
|
| 33 |
+
try (
|
| 34 |
+
// Create the file first so the test won't throw an exception if it doesn't exist.
|
| 35 |
+
// Note: Don't actually do this because this method signature could cause a tool to find
|
| 36 |
+
// THIS file constructor
|
| 37 |
+
// as a vuln, rather than the File signature we are trying to actually test.
|
| 38 |
+
// If necessary, just run the benchmark twice. The 1st run should create all the necessary
|
| 39 |
+
// files.
|
| 40 |
+
// new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR +
|
| 41 |
+
// param).createNewFile();
|
| 42 |
+
|
| 43 |
+
java.io.FileOutputStream fos =
|
| 44 |
+
new java.io.FileOutputStream(new java.io.FileInputStream(fileName).getFD()); ) {
|
| 45 |
+
response.getWriter()
|
| 46 |
+
.println(
|
| 47 |
+
"Now ready to write to file: "
|
| 48 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
|
| 49 |
+
|
| 50 |
+
} catch (Exception e) {
|
| 51 |
+
System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
|
| 52 |
+
}
|
| 53 |
+
}
|
| 54 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00046.java
ADDED
|
@@ -0,0 +1,80 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/hash-00/BenchmarkTest00046")
|
| 10 |
+
public class BenchmarkTest00046 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String[] values = request.getParameterValues("BenchmarkTest00046");
|
| 27 |
+
String param;
|
| 28 |
+
if (values != null && values.length > 0) param = values[0];
|
| 29 |
+
else param = "";
|
| 30 |
+
|
| 31 |
+
try {
|
| 32 |
+
java.security.MessageDigest md = java.security.MessageDigest.getInstance("MD5");
|
| 33 |
+
byte[] input = {(byte) '?'};
|
| 34 |
+
Object inputParam = param;
|
| 35 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 36 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 37 |
+
byte[] strInput = new byte[1000];
|
| 38 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 39 |
+
if (i == -1) {
|
| 40 |
+
response.getWriter()
|
| 41 |
+
.println(
|
| 42 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 43 |
+
return;
|
| 44 |
+
}
|
| 45 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 46 |
+
}
|
| 47 |
+
md.update(input);
|
| 48 |
+
|
| 49 |
+
byte[] result = md.digest();
|
| 50 |
+
java.io.File fileTarget =
|
| 51 |
+
new java.io.File(
|
| 52 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 53 |
+
"passwordFile.txt");
|
| 54 |
+
java.io.FileWriter fw =
|
| 55 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 56 |
+
fw.write(
|
| 57 |
+
"hash_value="
|
| 58 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 59 |
+
+ "\n");
|
| 60 |
+
fw.close();
|
| 61 |
+
response.getWriter()
|
| 62 |
+
.println(
|
| 63 |
+
"Sensitive value '"
|
| 64 |
+
+ org.owasp
|
| 65 |
+
.esapi
|
| 66 |
+
.ESAPI
|
| 67 |
+
.encoder()
|
| 68 |
+
.encodeForHTML(new String(input))
|
| 69 |
+
+ "' hashed and stored<br/>");
|
| 70 |
+
|
| 71 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 72 |
+
System.out.println("Problem executing hash - TestCase");
|
| 73 |
+
throw new ServletException(e);
|
| 74 |
+
}
|
| 75 |
+
|
| 76 |
+
response.getWriter()
|
| 77 |
+
.println(
|
| 78 |
+
"Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
|
| 79 |
+
}
|
| 80 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00047.java
ADDED
|
@@ -0,0 +1,57 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/xss-00/BenchmarkTest00047")
|
| 10 |
+
public class BenchmarkTest00047 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String queryString = request.getQueryString();
|
| 27 |
+
String paramval = "BenchmarkTest00047" + "=";
|
| 28 |
+
int paramLoc = -1;
|
| 29 |
+
if (queryString != null) paramLoc = queryString.indexOf(paramval);
|
| 30 |
+
if (paramLoc == -1) {
|
| 31 |
+
response.getWriter()
|
| 32 |
+
.println(
|
| 33 |
+
"getQueryString() couldn't find expected parameter '"
|
| 34 |
+
+ "BenchmarkTest00047"
|
| 35 |
+
+ "' in query string.");
|
| 36 |
+
return;
|
| 37 |
+
}
|
| 38 |
+
|
| 39 |
+
String param =
|
| 40 |
+
queryString.substring(
|
| 41 |
+
paramLoc
|
| 42 |
+
+ paramval
|
| 43 |
+
.length()); // 1st assume "BenchmarkTest00047" param is last
|
| 44 |
+
// parameter in query string.
|
| 45 |
+
// And then check to see if its in the middle of the query string and if so, trim off what
|
| 46 |
+
// comes after.
|
| 47 |
+
int ampersandLoc = queryString.indexOf("&", paramLoc);
|
| 48 |
+
if (ampersandLoc != -1) {
|
| 49 |
+
param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
|
| 50 |
+
}
|
| 51 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 52 |
+
|
| 53 |
+
response.setHeader("X-XSS-Protection", "0");
|
| 54 |
+
Object[] obj = {"a", "b"};
|
| 55 |
+
response.getWriter().format(param, obj);
|
| 56 |
+
}
|
| 57 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00048.java
ADDED
|
@@ -0,0 +1,56 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/xss-00/BenchmarkTest00048")
|
| 10 |
+
public class BenchmarkTest00048 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String queryString = request.getQueryString();
|
| 27 |
+
String paramval = "BenchmarkTest00048" + "=";
|
| 28 |
+
int paramLoc = -1;
|
| 29 |
+
if (queryString != null) paramLoc = queryString.indexOf(paramval);
|
| 30 |
+
if (paramLoc == -1) {
|
| 31 |
+
response.getWriter()
|
| 32 |
+
.println(
|
| 33 |
+
"getQueryString() couldn't find expected parameter '"
|
| 34 |
+
+ "BenchmarkTest00048"
|
| 35 |
+
+ "' in query string.");
|
| 36 |
+
return;
|
| 37 |
+
}
|
| 38 |
+
|
| 39 |
+
String param =
|
| 40 |
+
queryString.substring(
|
| 41 |
+
paramLoc
|
| 42 |
+
+ paramval
|
| 43 |
+
.length()); // 1st assume "BenchmarkTest00048" param is last
|
| 44 |
+
// parameter in query string.
|
| 45 |
+
// And then check to see if its in the middle of the query string and if so, trim off what
|
| 46 |
+
// comes after.
|
| 47 |
+
int ampersandLoc = queryString.indexOf("&", paramLoc);
|
| 48 |
+
if (ampersandLoc != -1) {
|
| 49 |
+
param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
|
| 50 |
+
}
|
| 51 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 52 |
+
|
| 53 |
+
response.setHeader("X-XSS-Protection", "0");
|
| 54 |
+
response.getWriter().print(param.toCharArray());
|
| 55 |
+
}
|
| 56 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00049.java
ADDED
|
@@ -0,0 +1,56 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/xss-00/BenchmarkTest00049")
|
| 10 |
+
public class BenchmarkTest00049 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
String queryString = request.getQueryString();
|
| 27 |
+
String paramval = "BenchmarkTest00049" + "=";
|
| 28 |
+
int paramLoc = -1;
|
| 29 |
+
if (queryString != null) paramLoc = queryString.indexOf(paramval);
|
| 30 |
+
if (paramLoc == -1) {
|
| 31 |
+
response.getWriter()
|
| 32 |
+
.println(
|
| 33 |
+
"getQueryString() couldn't find expected parameter '"
|
| 34 |
+
+ "BenchmarkTest00049"
|
| 35 |
+
+ "' in query string.");
|
| 36 |
+
return;
|
| 37 |
+
}
|
| 38 |
+
|
| 39 |
+
String param =
|
| 40 |
+
queryString.substring(
|
| 41 |
+
paramLoc
|
| 42 |
+
+ paramval
|
| 43 |
+
.length()); // 1st assume "BenchmarkTest00049" param is last
|
| 44 |
+
// parameter in query string.
|
| 45 |
+
// And then check to see if its in the middle of the query string and if so, trim off what
|
| 46 |
+
// comes after.
|
| 47 |
+
int ampersandLoc = queryString.indexOf("&", paramLoc);
|
| 48 |
+
if (ampersandLoc != -1) {
|
| 49 |
+
param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
|
| 50 |
+
}
|
| 51 |
+
param = java.net.URLDecoder.decode(param, "UTF-8");
|
| 52 |
+
|
| 53 |
+
response.setHeader("X-XSS-Protection", "0");
|
| 54 |
+
response.getWriter().write("Parameter value: " + param);
|
| 55 |
+
}
|
| 56 |
+
}
|
OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00050.java
ADDED
|
@@ -0,0 +1,134 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
import java.io.IOException;
|
| 3 |
+
import javax.servlet.ServletException;
|
| 4 |
+
import javax.servlet.annotation.WebServlet;
|
| 5 |
+
import javax.servlet.http.HttpServlet;
|
| 6 |
+
import javax.servlet.http.HttpServletRequest;
|
| 7 |
+
import javax.servlet.http.HttpServletResponse;
|
| 8 |
+
|
| 9 |
+
@WebServlet(value = "/crypto-00/BenchmarkTest00050")
|
| 10 |
+
public class BenchmarkTest00050 extends HttpServlet {
|
| 11 |
+
|
| 12 |
+
private static final long serialVersionUID = 1L;
|
| 13 |
+
|
| 14 |
+
@Override
|
| 15 |
+
public void doGet(HttpServletRequest request, HttpServletResponse response)
|
| 16 |
+
throws ServletException, IOException {
|
| 17 |
+
doPost(request, response);
|
| 18 |
+
}
|
| 19 |
+
|
| 20 |
+
@Override
|
| 21 |
+
public void doPost(HttpServletRequest request, HttpServletResponse response)
|
| 22 |
+
throws ServletException, IOException {
|
| 23 |
+
// some code
|
| 24 |
+
response.setContentType("text/html;charset=UTF-8");
|
| 25 |
+
|
| 26 |
+
org.owasp.benchmark.helpers.SeparateClassRequest scr =
|
| 27 |
+
new org.owasp.benchmark.helpers.SeparateClassRequest(request);
|
| 28 |
+
String param = scr.getTheValue("BenchmarkTest00050");
|
| 29 |
+
|
| 30 |
+
// Code based on example from:
|
| 31 |
+
// http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
|
| 32 |
+
// 8-byte initialization vector
|
| 33 |
+
// byte[] iv = {
|
| 34 |
+
// (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
|
| 35 |
+
// (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
|
| 36 |
+
// };
|
| 37 |
+
java.security.SecureRandom random = new java.security.SecureRandom();
|
| 38 |
+
byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
|
| 39 |
+
|
| 40 |
+
try {
|
| 41 |
+
javax.crypto.Cipher c =
|
| 42 |
+
javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
|
| 43 |
+
// Prepare the cipher to encrypt
|
| 44 |
+
javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
|
| 45 |
+
java.security.spec.AlgorithmParameterSpec paramSpec =
|
| 46 |
+
new javax.crypto.spec.IvParameterSpec(iv);
|
| 47 |
+
c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
|
| 48 |
+
|
| 49 |
+
// encrypt and store the results
|
| 50 |
+
byte[] input = {(byte) '?'};
|
| 51 |
+
Object inputParam = param;
|
| 52 |
+
if (inputParam instanceof String) input = ((String) inputParam).getBytes();
|
| 53 |
+
if (inputParam instanceof java.io.InputStream) {
|
| 54 |
+
byte[] strInput = new byte[1000];
|
| 55 |
+
int i = ((java.io.InputStream) inputParam).read(strInput);
|
| 56 |
+
if (i == -1) {
|
| 57 |
+
response.getWriter()
|
| 58 |
+
.println(
|
| 59 |
+
"This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
|
| 60 |
+
return;
|
| 61 |
+
}
|
| 62 |
+
input = java.util.Arrays.copyOf(strInput, i);
|
| 63 |
+
}
|
| 64 |
+
byte[] result = c.doFinal(input);
|
| 65 |
+
|
| 66 |
+
java.io.File fileTarget =
|
| 67 |
+
new java.io.File(
|
| 68 |
+
new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
|
| 69 |
+
"passwordFile.txt");
|
| 70 |
+
java.io.FileWriter fw =
|
| 71 |
+
new java.io.FileWriter(fileTarget, true); // the true will append the new data
|
| 72 |
+
fw.write(
|
| 73 |
+
"secret_value="
|
| 74 |
+
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
|
| 75 |
+
+ "\n");
|
| 76 |
+
fw.close();
|
| 77 |
+
response.getWriter()
|
| 78 |
+
.println(
|
| 79 |
+
"Sensitive value: '"
|
| 80 |
+
+ org.owasp
|
| 81 |
+
.esapi
|
| 82 |
+
.ESAPI
|
| 83 |
+
.encoder()
|
| 84 |
+
.encodeForHTML(new String(input))
|
| 85 |
+
+ "' encrypted and stored<br/>");
|
| 86 |
+
|
| 87 |
+
} catch (java.security.NoSuchAlgorithmException e) {
|
| 88 |
+
response.getWriter()
|
| 89 |
+
.println(
|
| 90 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 91 |
+
e.printStackTrace(response.getWriter());
|
| 92 |
+
throw new ServletException(e);
|
| 93 |
+
} catch (java.security.NoSuchProviderException e) {
|
| 94 |
+
response.getWriter()
|
| 95 |
+
.println(
|
| 96 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 97 |
+
e.printStackTrace(response.getWriter());
|
| 98 |
+
throw new ServletException(e);
|
| 99 |
+
} catch (javax.crypto.NoSuchPaddingException e) {
|
| 100 |
+
response.getWriter()
|
| 101 |
+
.println(
|
| 102 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 103 |
+
e.printStackTrace(response.getWriter());
|
| 104 |
+
throw new ServletException(e);
|
| 105 |
+
} catch (javax.crypto.IllegalBlockSizeException e) {
|
| 106 |
+
response.getWriter()
|
| 107 |
+
.println(
|
| 108 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 109 |
+
e.printStackTrace(response.getWriter());
|
| 110 |
+
throw new ServletException(e);
|
| 111 |
+
} catch (javax.crypto.BadPaddingException e) {
|
| 112 |
+
response.getWriter()
|
| 113 |
+
.println(
|
| 114 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 115 |
+
e.printStackTrace(response.getWriter());
|
| 116 |
+
throw new ServletException(e);
|
| 117 |
+
} catch (java.security.InvalidKeyException e) {
|
| 118 |
+
response.getWriter()
|
| 119 |
+
.println(
|
| 120 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 121 |
+
e.printStackTrace(response.getWriter());
|
| 122 |
+
throw new ServletException(e);
|
| 123 |
+
} catch (java.security.InvalidAlgorithmParameterException e) {
|
| 124 |
+
response.getWriter()
|
| 125 |
+
.println(
|
| 126 |
+
"Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
|
| 127 |
+
e.printStackTrace(response.getWriter());
|
| 128 |
+
throw new ServletException(e);
|
| 129 |
+
}
|
| 130 |
+
response.getWriter()
|
| 131 |
+
.println(
|
| 132 |
+
"Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
|
| 133 |
+
}
|
| 134 |
+
}
|