diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00001.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00001.java
new file mode 100644
index 0000000000000000000000000000000000000000..9b58400ebdf01445041beda0dec84f6380c5a044
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00001.java
@@ -0,0 +1,87 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00001")
+public class BenchmarkTest00001 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00001", "FileName");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00001.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00001")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String fileName = null;
+ java.io.FileInputStream fis = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
+ fis = new java.io.FileInputStream(new java.io.File(fileName));
+ byte[] b = new byte[1000];
+ int size = fis.read(b);
+ response.getWriter()
+ .println(
+ "The beginning of file: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
+ + "' is:\n\n"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(b, 0, size)));
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileInputStream on file: '" + fileName + "'");
+ response.getWriter()
+ .println(
+ "Problem getting FileInputStream: "
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(e.getMessage()));
+ } finally {
+ if (fis != null) {
+ try {
+ fis.close();
+ fis = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00002.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00002.java
new file mode 100644
index 0000000000000000000000000000000000000000..5e9849f89adb28845fb7be8013fe37a48aa0045c
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00002.java
@@ -0,0 +1,74 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00002")
+public class BenchmarkTest00002 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00002", "FileName");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00002.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00002")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String fileName = null;
+ java.io.FileOutputStream fos = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
+
+ fos = new java.io.FileOutputStream(fileName, false);
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
+ } finally {
+ if (fos != null) {
+ try {
+ fos.close();
+ fos = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00003.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00003.java
new file mode 100644
index 0000000000000000000000000000000000000000..13f248f0f022d7633d2474ae881bf4a11ec5d4a4
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00003.java
@@ -0,0 +1,101 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00003")
+public class BenchmarkTest00003 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00003", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00003.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00003")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00004.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00004.java
new file mode 100644
index 0000000000000000000000000000000000000000..a841f3f5a7dc381f8341d069f1492d3a97a475d6
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00004.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/trustbound-00/BenchmarkTest00004")
+public class BenchmarkTest00004 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00004", "color");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/trustbound-00/BenchmarkTest00004.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00004")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ // javax.servlet.http.HttpSession.setAttribute(java.lang.String^,java.lang.Object)
+ request.getSession().setAttribute(param, "10340");
+
+ response.getWriter()
+ .println(
+ "Item: '"
+ + org.owasp.benchmark.helpers.Utils.encodeForHTML(param)
+ + "' with value: '10340' saved in session.");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00005.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00005.java
new file mode 100644
index 0000000000000000000000000000000000000000..db574c6ac1ed2ed90585a8b95574c24f25eb9f8e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00005.java
@@ -0,0 +1,104 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00005")
+public class BenchmarkTest00005 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00005") != null) {
+ param = request.getHeader("BenchmarkTest00005");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException
+ | java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00006.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00006.java
new file mode 100644
index 0000000000000000000000000000000000000000..80c89e60e4a2b100e7a6ce3dea7320163d21f4ff
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00006.java
@@ -0,0 +1,59 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00006")
+public class BenchmarkTest00006 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00006") != null) {
+ param = request.getHeader("BenchmarkTest00006");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ java.util.List argList = new java.util.ArrayList();
+
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ argList.add("cmd.exe");
+ argList.add("/c");
+ } else {
+ argList.add("sh");
+ argList.add("-c");
+ }
+ argList.add("echo " + param);
+
+ ProcessBuilder pb = new ProcessBuilder();
+
+ pb.command(argList);
+
+ try {
+ Process p = pb.start();
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println(
+ "Problem executing cmdi - java.lang.ProcessBuilder(java.util.List) Test Case");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00007.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00007.java
new file mode 100644
index 0000000000000000000000000000000000000000..048d64f0ba44309ef6395ad0833288efd53e1ede
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00007.java
@@ -0,0 +1,52 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00007")
+public class BenchmarkTest00007 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00007") != null) {
+ param = request.getHeader("BenchmarkTest00007");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String cmd =
+ org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
+ this.getClass().getClassLoader());
+ String[] args = {cmd};
+ String[] argsEnv = {param};
+
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(args, argsEnv);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00008.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00008.java
new file mode 100644
index 0000000000000000000000000000000000000000..3d3e5e23e70a17ee5c9600d7610a32c714d98f68
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00008.java
@@ -0,0 +1,50 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00008")
+public class BenchmarkTest00008 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00008") != null) {
+ param = request.getHeader("BenchmarkTest00008");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String sql = "{call " + param + "}";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.CallableStatement statement = connection.prepareCall(sql);
+ java.sql.ResultSet rs = statement.executeQuery();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(rs, sql, response);
+
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00009.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00009.java
new file mode 100644
index 0000000000000000000000000000000000000000..cc1e097e4355a1e2d6015cd03a7ae865b4cd5e6a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00009.java
@@ -0,0 +1,106 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00009")
+public class BenchmarkTest00009 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ java.security.Provider[] provider = java.security.Security.getProviders();
+ java.security.MessageDigest md;
+
+ try {
+ if (provider.length > 1) {
+
+ md = java.security.MessageDigest.getInstance("sha-384", provider[0]);
+ } else {
+ md = java.security.MessageDigest.getInstance("sha-384", "SUN");
+ }
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00010.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00010.java
new file mode 100644
index 0000000000000000000000000000000000000000..9a3524874ba3b9e89bf19ce5a3ab0025fade8464
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00010.java
@@ -0,0 +1,98 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00010")
+public class BenchmarkTest00010 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ try {
+ int randNumber = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "SafeInga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextInt(int) - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00011.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00011.java
new file mode 100644
index 0000000000000000000000000000000000000000..613457b1d5f4450ef7d7d5cde13656efea7cb272
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00011.java
@@ -0,0 +1,52 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00011")
+public class BenchmarkTest00011 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration headers = request.getHeaders("BenchmarkTest00011");
+
+ if (headers != null && headers.hasMoreElements()) {
+ param = headers.nextElement(); // just grab first element
+ }
+
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ java.io.File fileTarget = new java.io.File(param, "/Test.txt");
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00012.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00012.java
new file mode 100644
index 0000000000000000000000000000000000000000..792daf19c1efc316978da3b4e19fd127167193e5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00012.java
@@ -0,0 +1,88 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/ldapi-00/BenchmarkTest00012")
+public class BenchmarkTest00012 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration headers = request.getHeaders("BenchmarkTest00012");
+
+ if (headers != null && headers.hasMoreElements()) {
+ param = headers.nextElement(); // just grab first element
+ }
+
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
+ try {
+ response.setContentType("text/html;charset=UTF-8");
+ String base = "ou=users,ou=system";
+ javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
+ sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
+ String filter = "(&(objectclass=person))(|(uid=" + param + ")(street={0}))";
+ Object[] filters = new Object[] {"The streetz 4 Ms bar"};
+
+ javax.naming.directory.DirContext ctx = ads.getDirContext();
+ javax.naming.directory.InitialDirContext idc =
+ (javax.naming.directory.InitialDirContext) ctx;
+ boolean found = false;
+ javax.naming.NamingEnumeration results =
+ idc.search(base, filter, filters, sc);
+ while (results.hasMore()) {
+ javax.naming.directory.SearchResult sr =
+ (javax.naming.directory.SearchResult) results.next();
+ javax.naming.directory.Attributes attrs = sr.getAttributes();
+
+ javax.naming.directory.Attribute attr = attrs.get("uid");
+ javax.naming.directory.Attribute attr2 = attrs.get("street");
+ if (attr != null) {
+ response.getWriter()
+ .println(
+ "LDAP query results:
"
+ + "Record found with name "
+ + attr.get()
+ + "
"
+ + "Address: "
+ + attr2.get()
+ + "
");
+ // System.out.println("record found " + attr.get());
+ found = true;
+ }
+ }
+ if (!found) {
+ response.getWriter()
+ .println(
+ "LDAP query results: nothing found for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
+ }
+ } catch (javax.naming.NamingException e) {
+ throw new ServletException(e);
+ } finally {
+ try {
+ ads.closeDirContext();
+ } catch (Exception e) {
+ throw new ServletException(e);
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00013.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00013.java
new file mode 100644
index 0000000000000000000000000000000000000000..fa0b2a460318a4abea9e4291c22eb8c2b93897e5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00013.java
@@ -0,0 +1,40 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00013")
+public class BenchmarkTest00013 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration headers = request.getHeaders("Referer");
+
+ if (headers != null && headers.hasMoreElements()) {
+ param = headers.nextElement(); // just grab first element
+ }
+
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", "b"};
+ response.getWriter().format(java.util.Locale.US, param, obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00014.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00014.java
new file mode 100644
index 0000000000000000000000000000000000000000..229eee02b167450ffdec11beb88bb88d3435cf89
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00014.java
@@ -0,0 +1,40 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00014")
+public class BenchmarkTest00014 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration headers = request.getHeaders("Referer");
+
+ if (headers != null && headers.hasMoreElements()) {
+ param = headers.nextElement(); // just grab first element
+ }
+
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", "b"};
+ response.getWriter().format(param, obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00015.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00015.java
new file mode 100644
index 0000000000000000000000000000000000000000..a8fbac0dba013c7b479865f5f013a0cc27533c0d
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00015.java
@@ -0,0 +1,61 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00015")
+public class BenchmarkTest00015 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration headers = request.getHeaders("BenchmarkTest00015");
+
+ if (headers != null && headers.hasMoreElements()) {
+ param = headers.nextElement(); // just grab first element
+ }
+
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ java.util.List argList = new java.util.ArrayList();
+
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ argList.add("cmd.exe");
+ argList.add("/c");
+ } else {
+ argList.add("sh");
+ argList.add("-c");
+ }
+ argList.add("echo " + param);
+
+ ProcessBuilder pb = new ProcessBuilder();
+
+ pb.command(argList);
+
+ try {
+ Process p = pb.start();
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println(
+ "Problem executing cmdi - java.lang.ProcessBuilder(java.util.List) Test Case");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00016.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00016.java
new file mode 100644
index 0000000000000000000000000000000000000000..bd989ce9fc199529a468d3de6455f85bbc3c56ab
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00016.java
@@ -0,0 +1,65 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/securecookie-00/BenchmarkTest00016")
+public class BenchmarkTest00016 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration headers = request.getHeaders("BenchmarkTest00016");
+
+ if (headers != null && headers.hasMoreElements()) {
+ param = headers.nextElement(); // just grab first element
+ }
+
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ byte[] input = new byte[1000];
+ String str = "?";
+ Object inputParam = param;
+ if (inputParam instanceof String) str = ((String) inputParam);
+ if (inputParam instanceof java.io.InputStream) {
+ int i = ((java.io.InputStream) inputParam).read(input);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ str = new String(input, 0, i);
+ }
+ if ("".equals(str)) str = "No cookie value supplied";
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
+
+ cookie.setSecure(true);
+ cookie.setHttpOnly(true);
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ response.addCookie(cookie);
+
+ response.getWriter()
+ .println(
+ "Created cookie: 'SomeCookie': with value: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
+ + "' and secure flag set to: true");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00017.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00017.java
new file mode 100644
index 0000000000000000000000000000000000000000..a970a74d29289cf23af898ceebbc2a075582f5ef
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00017.java
@@ -0,0 +1,54 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00017")
+public class BenchmarkTest00017 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration headers = request.getHeaders("BenchmarkTest00017");
+
+ if (headers != null && headers.hasMoreElements()) {
+ param = headers.nextElement(); // just grab first element
+ }
+
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String cmd = "";
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("echo");
+ }
+
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(cmd + param);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00018.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00018.java
new file mode 100644
index 0000000000000000000000000000000000000000..c54093a7a7fc8e788e1b6748dabdc38f27cc493a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00018.java
@@ -0,0 +1,50 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00018")
+public class BenchmarkTest00018 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration headers = request.getHeaders("BenchmarkTest00018");
+
+ if (headers != null && headers.hasMoreElements()) {
+ param = headers.nextElement(); // just grab first element
+ }
+
+ // URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql);
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00019.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00019.java
new file mode 100644
index 0000000000000000000000000000000000000000..53250ad4bac37bf54a7cb952c6f9375e71bfb07a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00019.java
@@ -0,0 +1,89 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00019")
+public class BenchmarkTest00019 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ java.io.InputStream param = request.getInputStream();
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg1", "DESede/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00020.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00020.java
new file mode 100644
index 0000000000000000000000000000000000000000..72b52f2dbf3effd16070c83bbf3736ebf3b93b6c
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00020.java
@@ -0,0 +1,133 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00020")
+public class BenchmarkTest00020 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = request.getParameter("BenchmarkTest00020");
+ if (param == null) param = "";
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00021.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00021.java
new file mode 100644
index 0000000000000000000000000000000000000000..c5669a4fc2474c45daf01b37402a54d335d4c0df
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00021.java
@@ -0,0 +1,79 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/ldapi-00/BenchmarkTest00021")
+public class BenchmarkTest00021 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = request.getParameter("BenchmarkTest00021");
+ if (param == null) param = "";
+
+ org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
+ try {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.naming.directory.DirContext ctx = ads.getDirContext();
+ String base = "ou=users,ou=system";
+ javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
+ sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
+ String filter = "(&(objectclass=person))(|(uid=" + param + ")(street={0}))";
+ Object[] filters = new Object[] {"The streetz 4 Ms bar"};
+ // System.out.println("Filter " + filter);
+ boolean found = false;
+ javax.naming.NamingEnumeration results =
+ ctx.search(base, filter, filters, sc);
+ while (results.hasMore()) {
+ javax.naming.directory.SearchResult sr =
+ (javax.naming.directory.SearchResult) results.next();
+ javax.naming.directory.Attributes attrs = sr.getAttributes();
+
+ javax.naming.directory.Attribute attr = attrs.get("uid");
+ javax.naming.directory.Attribute attr2 = attrs.get("street");
+ if (attr != null) {
+ response.getWriter()
+ .println(
+ "LDAP query results:
"
+ + "Record found with name "
+ + attr.get()
+ + "
"
+ + "Address: "
+ + attr2.get()
+ + "
");
+ // System.out.println("record found " + attr.get());
+ found = true;
+ }
+ }
+ if (!found) {
+ response.getWriter()
+ .println(
+ "LDAP query results: nothing found for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
+ }
+ } catch (javax.naming.NamingException e) {
+ throw new ServletException(e);
+ } finally {
+ try {
+ ads.closeDirContext();
+ } catch (Exception e) {
+ throw new ServletException(e);
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00022.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00022.java
new file mode 100644
index 0000000000000000000000000000000000000000..0f21eb09d9111bc2e5dfa178c2e4f7dc76790fc0
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00022.java
@@ -0,0 +1,78 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00022")
+public class BenchmarkTest00022 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = request.getParameter("BenchmarkTest00022");
+ if (param == null) param = "";
+
+ try {
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance("SHA-256");
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00023.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00023.java
new file mode 100644
index 0000000000000000000000000000000000000000..7e669dd4e1948624a72c80cd19c609f1e6ef26f1
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00023.java
@@ -0,0 +1,78 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00023")
+public class BenchmarkTest00023 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = request.getParameter("BenchmarkTest00023");
+ if (param == null) param = "";
+
+ float rand = new java.util.Random().nextFloat();
+ String rememberMeKey = Float.toString(rand).substring(2); // Trim off the 0. at the front.
+
+ String user = "Floyd";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextFloat() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00024.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00024.java
new file mode 100644
index 0000000000000000000000000000000000000000..8daefab7140dc180f8bc0364a81a7da98d93c9ec
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00024.java
@@ -0,0 +1,50 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00024")
+public class BenchmarkTest00024 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = request.getParameter("BenchmarkTest00024");
+ if (param == null) param = "";
+
+ String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + param + "'";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.PreparedStatement statement =
+ connection.prepareStatement(
+ sql,
+ java.sql.ResultSet.TYPE_FORWARD_ONLY,
+ java.sql.ResultSet.CONCUR_READ_ONLY,
+ java.sql.ResultSet.CLOSE_CURSORS_AT_COMMIT);
+ statement.setString(1, "foo");
+ statement.execute();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00025.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00025.java
new file mode 100644
index 0000000000000000000000000000000000000000..9a41fa7e0810da7a479dec7fce88634a431fca30
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00025.java
@@ -0,0 +1,48 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00025")
+public class BenchmarkTest00025 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = request.getParameter("BenchmarkTest00025");
+ if (param == null) param = "";
+
+ String sql = "SELECT userid from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
+ try {
+ // Long results =
+ // org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForLong(sql);
+ Long results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForObject(
+ sql, Long.class);
+ response.getWriter().println("Your results are: " + String.valueOf(results));
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00026.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00026.java
new file mode 100644
index 0000000000000000000000000000000000000000..4cff3db946f4277734bfe9a43ddfbbe97a458bab
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00026.java
@@ -0,0 +1,58 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00026")
+public class BenchmarkTest00026 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = request.getParameter("BenchmarkTest00026");
+ if (param == null) param = "";
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
+ try {
+ org.springframework.jdbc.support.rowset.SqlRowSet results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForRowSet(sql);
+ response.getWriter().println("Your results are: ");
+
+ // System.out.println("Your results are");
+ while (results.next()) {
+ response.getWriter()
+ .println(
+ org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(results.getString("USERNAME"))
+ + " ");
+ // System.out.println(results.getString("USERNAME"));
+ }
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00027.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00027.java
new file mode 100644
index 0000000000000000000000000000000000000000..28d2f047b0097da35b018c845ca7386bb8a6df34
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00027.java
@@ -0,0 +1,43 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00027")
+public class BenchmarkTest00027 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = request.getParameter("BenchmarkTest00027");
+ if (param == null) param = "";
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql);
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00028.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00028.java
new file mode 100644
index 0000000000000000000000000000000000000000..c9782b848a7cebc361f9d991fbce707867135755
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00028.java
@@ -0,0 +1,59 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00028")
+public class BenchmarkTest00028 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ java.util.Map map = request.getParameterMap();
+ String param = "";
+ if (!map.isEmpty()) {
+ String[] values = map.get("BenchmarkTest00028");
+ if (values != null) param = values[0];
+ }
+
+ String fileName = null;
+ java.io.FileOutputStream fos = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
+
+ fos = new java.io.FileOutputStream(fileName, false);
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
+ } finally {
+ if (fos != null) {
+ try {
+ fos.close();
+ fos = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00029.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00029.java
new file mode 100644
index 0000000000000000000000000000000000000000..f7c646048a36d7f316a44941eaf7e8e77bc4137f
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00029.java
@@ -0,0 +1,86 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00029")
+public class BenchmarkTest00029 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ java.util.Map map = request.getParameterMap();
+ String param = "";
+ if (!map.isEmpty()) {
+ String[] values = map.get("BenchmarkTest00029");
+ if (values != null) param = values[0];
+ }
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00030.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00030.java
new file mode 100644
index 0000000000000000000000000000000000000000..cbef22aa3e809cc92eed0a1484cc64627593ec23
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00030.java
@@ -0,0 +1,37 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00030")
+public class BenchmarkTest00030 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ java.util.Map map = request.getParameterMap();
+ String param = "";
+ if (!map.isEmpty()) {
+ String[] values = map.get("BenchmarkTest00030");
+ if (values != null) param = values[0];
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", "b"};
+ response.getWriter().printf(param, obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00031.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00031.java
new file mode 100644
index 0000000000000000000000000000000000000000..a100495e1bcc27e088b20efb5b5746716eabb3e2
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00031.java
@@ -0,0 +1,42 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/trustbound-00/BenchmarkTest00031")
+public class BenchmarkTest00031 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ java.util.Map map = request.getParameterMap();
+ String param = "";
+ if (!map.isEmpty()) {
+ String[] values = map.get("BenchmarkTest00031");
+ if (values != null) param = values[0];
+ }
+
+ // javax.servlet.http.HttpSession.putValue(java.lang.String,java.lang.Object^)
+ request.getSession().putValue("userid", param);
+
+ response.getWriter()
+ .println(
+ "Item: 'userid' with value: '"
+ + org.owasp.benchmark.helpers.Utils.encodeForHTML(param)
+ + "' saved in session.");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00032.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00032.java
new file mode 100644
index 0000000000000000000000000000000000000000..7a1ac213f85ab347983fb7c8d3be5626366b2aaa
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00032.java
@@ -0,0 +1,50 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00032")
+public class BenchmarkTest00032 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ java.util.Map map = request.getParameterMap();
+ String param = "";
+ if (!map.isEmpty()) {
+ String[] values = map.get("BenchmarkTest00032");
+ if (values != null) param = values[0];
+ }
+
+ try {
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
+
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.execute(sql);
+ response.getWriter()
+ .println(
+ "No results can be displayed for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
+ + "
"
+ + " because the Spring execute method doesn't return results.");
+
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00033.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00033.java
new file mode 100644
index 0000000000000000000000000000000000000000..e68f893ee9db79107b556db04e4fc5b84ba28f95
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00033.java
@@ -0,0 +1,62 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00033")
+public class BenchmarkTest00033 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ java.util.Map map = request.getParameterMap();
+ String param = "";
+ if (!map.isEmpty()) {
+ String[] values = map.get("BenchmarkTest00033");
+ if (values != null) param = values[0];
+ }
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
+ try {
+ org.springframework.jdbc.support.rowset.SqlRowSet results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForRowSet(sql);
+ response.getWriter().println("Your results are: ");
+
+ // System.out.println("Your results are");
+ while (results.next()) {
+ response.getWriter()
+ .println(
+ org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(results.getString("USERNAME"))
+ + " ");
+ // System.out.println(results.getString("USERNAME"));
+ }
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00034.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00034.java
new file mode 100644
index 0000000000000000000000000000000000000000..2f5159a24a811c873c47668889c10e904f127638
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00034.java
@@ -0,0 +1,47 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00034")
+public class BenchmarkTest00034 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ java.util.Map map = request.getParameterMap();
+ String param = "";
+ if (!map.isEmpty()) {
+ String[] values = map.get("BenchmarkTest00034");
+ if (values != null) param = values[0];
+ }
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ statement.execute(sql, java.sql.Statement.RETURN_GENERATED_KEYS);
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00035.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00035.java
new file mode 100644
index 0000000000000000000000000000000000000000..af5eb865936845251985eb417bc4b26be09200f8
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00035.java
@@ -0,0 +1,104 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00035")
+public class BenchmarkTest00035 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ boolean flag = true;
+ java.util.Enumeration names = request.getParameterNames();
+ while (names.hasMoreElements() && flag) {
+ String name = (String) names.nextElement();
+ String[] values = request.getParameterValues(name);
+ if (values != null) {
+ for (int i = 0; i < values.length && flag; i++) {
+ String value = values[i];
+ if (value.equals("BenchmarkTest00035")) {
+ param = name;
+ flag = false;
+ }
+ }
+ }
+ }
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg1", "DESede/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00036.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00036.java
new file mode 100644
index 0000000000000000000000000000000000000000..82f15728075ce52f20f0ae80b010c68bfed3278f
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00036.java
@@ -0,0 +1,50 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00036")
+public class BenchmarkTest00036 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ boolean flag = true;
+ java.util.Enumeration names = request.getParameterNames();
+ while (names.hasMoreElements() && flag) {
+ String name = (String) names.nextElement();
+ String[] values = request.getParameterValues(name);
+ if (values != null) {
+ for (int i = 0; i < values.length && flag; i++) {
+ String value = values[i];
+ if (value.equals("BenchmarkTest00036")) {
+ param = name;
+ flag = false;
+ }
+ }
+ }
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ int length = 1;
+ if (param != null) {
+ length = param.length();
+ response.getWriter().write(param.toCharArray(), 0, length);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00037.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00037.java
new file mode 100644
index 0000000000000000000000000000000000000000..fbceb1e7d400e2679540a0410fc576ed535c92eb
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00037.java
@@ -0,0 +1,64 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00037")
+public class BenchmarkTest00037 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ boolean flag = true;
+ java.util.Enumeration names = request.getParameterNames();
+ while (names.hasMoreElements() && flag) {
+ String name = (String) names.nextElement();
+ String[] values = request.getParameterValues(name);
+ if (values != null) {
+ for (int i = 0; i < values.length && flag; i++) {
+ String value = values[i];
+ if (value.equals("BenchmarkTest00037")) {
+ param = name;
+ flag = false;
+ }
+ }
+ }
+ }
+
+ String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + param + "'";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.PreparedStatement statement =
+ connection.prepareStatement(
+ sql,
+ java.sql.ResultSet.TYPE_FORWARD_ONLY,
+ java.sql.ResultSet.CONCUR_READ_ONLY,
+ java.sql.ResultSet.CLOSE_CURSORS_AT_COMMIT);
+ statement.setString(1, "foo");
+ statement.execute();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00038.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00038.java
new file mode 100644
index 0000000000000000000000000000000000000000..13a4a322589af3d22d9259b558d14115ddcddcff
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00038.java
@@ -0,0 +1,79 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00038")
+public class BenchmarkTest00038 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ boolean flag = true;
+ java.util.Enumeration names = request.getParameterNames();
+ while (names.hasMoreElements() && flag) {
+ String name = (String) names.nextElement();
+ String[] values = request.getParameterValues(name);
+ if (values != null) {
+ for (int i = 0; i < values.length && flag; i++) {
+ String value = values[i];
+ if (value.equals("BenchmarkTest00038")) {
+ param = name;
+ flag = false;
+ }
+ }
+ }
+ }
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
+ try {
+ java.util.List results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.query(
+ sql,
+ new org.springframework.jdbc.core.RowMapper() {
+ @Override
+ public String mapRow(java.sql.ResultSet rs, int rowNum)
+ throws java.sql.SQLException {
+ try {
+ return rs.getString("USERNAME");
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper
+ .hideSQLErrors) {
+ return "Error processing query.";
+ } else throw e;
+ }
+ }
+ });
+ response.getWriter().println("Your results are: ");
+
+ for (String s : results) {
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(s) + "
");
+ }
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00039.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00039.java
new file mode 100644
index 0000000000000000000000000000000000000000..fff4159d49b6033f77cde3227b211d068721b648
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00039.java
@@ -0,0 +1,65 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00039")
+public class BenchmarkTest00039 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ boolean flag = true;
+ java.util.Enumeration names = request.getParameterNames();
+ while (names.hasMoreElements() && flag) {
+ String name = (String) names.nextElement();
+ String[] values = request.getParameterValues(name);
+ if (values != null) {
+ for (int i = 0; i < values.length && flag; i++) {
+ String value = values[i];
+ if (value.equals("BenchmarkTest00039")) {
+ param = name;
+ flag = false;
+ }
+ }
+ }
+ }
+
+ String sql =
+ "SELECT TOP 1 userid from USERS where USERNAME='foo' and PASSWORD='" + param + "'";
+ try {
+ java.util.Map results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForMap(sql);
+ response.getWriter().println("Your results are: ");
+
+ // System.out.println("Your results are");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(results.toString()));
+ // System.out.println(results.toString());
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00040.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00040.java
new file mode 100644
index 0000000000000000000000000000000000000000..fc80a4bf68ef3dc31df30be027d5a4b5885e1ed7
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00040.java
@@ -0,0 +1,47 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00040")
+public class BenchmarkTest00040 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
+ String param = scr.getTheParameter("BenchmarkTest00040");
+ if (param == null) param = "";
+
+ java.io.File fileTarget = new java.io.File(param);
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00041.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00041.java
new file mode 100644
index 0000000000000000000000000000000000000000..754542c41fa03a7147da734f7d14895ce029d5f7
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00041.java
@@ -0,0 +1,38 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00041")
+public class BenchmarkTest00041 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
+ String param = scr.getTheParameter("BenchmarkTest00041");
+ if (param == null) param = "";
+
+ response.setHeader("X-XSS-Protection", "0");
+ int length = 1;
+ if (param != null) {
+ length = param.length();
+ response.getWriter().write(param, 0, length);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00042.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00042.java
new file mode 100644
index 0000000000000000000000000000000000000000..3c680602e171869b0a4941a755844650cb5a1507
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00042.java
@@ -0,0 +1,85 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00042")
+public class BenchmarkTest00042 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
+ String param = scr.getTheParameter("BenchmarkTest00042");
+ if (param == null) param = "";
+
+ try {
+ int r = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt();
+ String rememberMeKey = Integer.toString(r);
+
+ String user = "SafeIngrid";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextInt() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00043.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00043.java
new file mode 100644
index 0000000000000000000000000000000000000000..5bc876330eade763d49b4aca836a85d97efea977
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00043.java
@@ -0,0 +1,45 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00043")
+public class BenchmarkTest00043 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
+ String param = scr.getTheParameter("BenchmarkTest00043");
+ if (param == null) param = "";
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + param + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql, new int[] {1, 2});
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00044.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00044.java
new file mode 100644
index 0000000000000000000000000000000000000000..d4e8fcd190f23343d4952e5da27bcddce9a54b10
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00044.java
@@ -0,0 +1,80 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/ldapi-00/BenchmarkTest00044")
+public class BenchmarkTest00044 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String[] values = request.getParameterValues("BenchmarkTest00044");
+ String param;
+ if (values != null && values.length > 0) param = values[0];
+ else param = "";
+
+ org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
+ try {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.naming.directory.DirContext ctx = ads.getDirContext();
+ String base = "ou=users,ou=system";
+ javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
+ sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
+ String filter = "(&(objectclass=person)(uid=" + param + "))";
+ // System.out.println("Filter " + filter);
+ boolean found = false;
+ javax.naming.NamingEnumeration results =
+ ctx.search(base, filter, sc);
+ while (results.hasMore()) {
+ javax.naming.directory.SearchResult sr =
+ (javax.naming.directory.SearchResult) results.next();
+ javax.naming.directory.Attributes attrs = sr.getAttributes();
+
+ javax.naming.directory.Attribute attr = attrs.get("uid");
+ javax.naming.directory.Attribute attr2 = attrs.get("street");
+ if (attr != null) {
+ response.getWriter()
+ .println(
+ "LDAP query results:
"
+ + "Record found with name "
+ + attr.get()
+ + "
"
+ + "Address: "
+ + attr2.get()
+ + "
");
+ // System.out.println("record found " + attr.get());
+ found = true;
+ }
+ }
+ if (!found) {
+ response.getWriter()
+ .println(
+ "LDAP query results: nothing found for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
+ }
+ } catch (javax.naming.NamingException e) {
+ throw new ServletException(e);
+ } finally {
+ try {
+ ads.closeDirContext();
+ } catch (Exception e) {
+ throw new ServletException(e);
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00045.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00045.java
new file mode 100644
index 0000000000000000000000000000000000000000..bd6a494a590f0d3f05da99598131adfad5ed3242
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00045.java
@@ -0,0 +1,54 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00045")
+public class BenchmarkTest00045 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String[] values = request.getParameterValues("BenchmarkTest00045");
+ String param;
+ if (values != null && values.length > 0) param = values[0];
+ else param = "";
+
+ String fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + param;
+
+ try (
+ // Create the file first so the test won't throw an exception if it doesn't exist.
+ // Note: Don't actually do this because this method signature could cause a tool to find
+ // THIS file constructor
+ // as a vuln, rather than the File signature we are trying to actually test.
+ // If necessary, just run the benchmark twice. The 1st run should create all the necessary
+ // files.
+ // new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR +
+ // param).createNewFile();
+
+ java.io.FileOutputStream fos =
+ new java.io.FileOutputStream(new java.io.FileInputStream(fileName).getFD()); ) {
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00046.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00046.java
new file mode 100644
index 0000000000000000000000000000000000000000..c4550201e289164ebe0999c3fd3620f2137dbd85
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00046.java
@@ -0,0 +1,80 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00046")
+public class BenchmarkTest00046 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String[] values = request.getParameterValues("BenchmarkTest00046");
+ String param;
+ if (values != null && values.length > 0) param = values[0];
+ else param = "";
+
+ try {
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance("MD5");
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00047.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00047.java
new file mode 100644
index 0000000000000000000000000000000000000000..c4fc684471a4b2732c04d2b58ba2f7e5d19e44f4
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00047.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00047")
+public class BenchmarkTest00047 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String queryString = request.getQueryString();
+ String paramval = "BenchmarkTest00047" + "=";
+ int paramLoc = -1;
+ if (queryString != null) paramLoc = queryString.indexOf(paramval);
+ if (paramLoc == -1) {
+ response.getWriter()
+ .println(
+ "getQueryString() couldn't find expected parameter '"
+ + "BenchmarkTest00047"
+ + "' in query string.");
+ return;
+ }
+
+ String param =
+ queryString.substring(
+ paramLoc
+ + paramval
+ .length()); // 1st assume "BenchmarkTest00047" param is last
+ // parameter in query string.
+ // And then check to see if its in the middle of the query string and if so, trim off what
+ // comes after.
+ int ampersandLoc = queryString.indexOf("&", paramLoc);
+ if (ampersandLoc != -1) {
+ param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
+ }
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", "b"};
+ response.getWriter().format(param, obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00048.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00048.java
new file mode 100644
index 0000000000000000000000000000000000000000..f42fcc9ab68a155c5e66cb4d8c13faf4b30673e5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00048.java
@@ -0,0 +1,56 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00048")
+public class BenchmarkTest00048 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String queryString = request.getQueryString();
+ String paramval = "BenchmarkTest00048" + "=";
+ int paramLoc = -1;
+ if (queryString != null) paramLoc = queryString.indexOf(paramval);
+ if (paramLoc == -1) {
+ response.getWriter()
+ .println(
+ "getQueryString() couldn't find expected parameter '"
+ + "BenchmarkTest00048"
+ + "' in query string.");
+ return;
+ }
+
+ String param =
+ queryString.substring(
+ paramLoc
+ + paramval
+ .length()); // 1st assume "BenchmarkTest00048" param is last
+ // parameter in query string.
+ // And then check to see if its in the middle of the query string and if so, trim off what
+ // comes after.
+ int ampersandLoc = queryString.indexOf("&", paramLoc);
+ if (ampersandLoc != -1) {
+ param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
+ }
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ response.setHeader("X-XSS-Protection", "0");
+ response.getWriter().print(param.toCharArray());
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00049.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00049.java
new file mode 100644
index 0000000000000000000000000000000000000000..d783465bdd982f7625c31d945fec8d0a37a93544
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00049.java
@@ -0,0 +1,56 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00049")
+public class BenchmarkTest00049 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ String queryString = request.getQueryString();
+ String paramval = "BenchmarkTest00049" + "=";
+ int paramLoc = -1;
+ if (queryString != null) paramLoc = queryString.indexOf(paramval);
+ if (paramLoc == -1) {
+ response.getWriter()
+ .println(
+ "getQueryString() couldn't find expected parameter '"
+ + "BenchmarkTest00049"
+ + "' in query string.");
+ return;
+ }
+
+ String param =
+ queryString.substring(
+ paramLoc
+ + paramval
+ .length()); // 1st assume "BenchmarkTest00049" param is last
+ // parameter in query string.
+ // And then check to see if its in the middle of the query string and if so, trim off what
+ // comes after.
+ int ampersandLoc = queryString.indexOf("&", paramLoc);
+ if (ampersandLoc != -1) {
+ param = queryString.substring(paramLoc + paramval.length(), ampersandLoc);
+ }
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ response.setHeader("X-XSS-Protection", "0");
+ response.getWriter().write("Parameter value: " + param);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00050.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00050.java
new file mode 100644
index 0000000000000000000000000000000000000000..96325acf7be76ea5e14f60b2dedeec02ced49f32
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00050.java
@@ -0,0 +1,134 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00050")
+public class BenchmarkTest00050 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
+ String param = scr.getTheValue("BenchmarkTest00050");
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = param;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00051.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00051.java
new file mode 100644
index 0000000000000000000000000000000000000000..4fff20645227de691eb79c0276ffc9d03fd56189
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00051.java
@@ -0,0 +1,53 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00051")
+public class BenchmarkTest00051 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
+ String param = scr.getTheValue("BenchmarkTest00051");
+
+ String a1 = "";
+ String a2 = "";
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ a1 = "cmd.exe";
+ a2 = "/c";
+ } else {
+ a1 = "sh";
+ a2 = "-c";
+ }
+ String[] args = {a1, a2, "echo " + param};
+
+ ProcessBuilder pb = new ProcessBuilder(args);
+
+ try {
+ Process p = pb.start();
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println(
+ "Problem executing cmdi - java.lang.ProcessBuilder(java.lang.String[]) Test Case");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00052.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00052.java
new file mode 100644
index 0000000000000000000000000000000000000000..9b1598c5108f8172fc6bd959cb8d2a924e579cda
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00052.java
@@ -0,0 +1,50 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00052")
+public class BenchmarkTest00052 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ // some code
+ response.setContentType("text/html;charset=UTF-8");
+
+ org.owasp.benchmark.helpers.SeparateClassRequest scr =
+ new org.owasp.benchmark.helpers.SeparateClassRequest(request);
+ String param = scr.getTheValue("BenchmarkTest00052");
+
+ String sql = "{call " + param + "}";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.CallableStatement statement =
+ connection.prepareCall(
+ sql,
+ java.sql.ResultSet.TYPE_FORWARD_ONLY,
+ java.sql.ResultSet.CONCUR_READ_ONLY,
+ java.sql.ResultSet.CLOSE_CURSORS_AT_COMMIT);
+ java.sql.ResultSet rs = statement.executeQuery();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(rs, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00053.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00053.java
new file mode 100644
index 0000000000000000000000000000000000000000..ee8cd792ac66fc9acd7d3acd4b34e1cb30ed61c8
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00053.java
@@ -0,0 +1,154 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00053")
+public class BenchmarkTest00053 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00053", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/crypto-00/BenchmarkTest00053.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00053")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance(
+ "DES/CBC/PKCS5PADDING", java.security.Security.getProvider("SunJCE"));
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00054.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00054.java
new file mode 100644
index 0000000000000000000000000000000000000000..bab334ec192195498afc2d3edda083f8280216f2
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00054.java
@@ -0,0 +1,150 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00054")
+public class BenchmarkTest00054 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00054", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/crypto-00/BenchmarkTest00054.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00054")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // AES/GCM example from:
+ // https://javainterviewpoint.com/java-aes-256-gcm-encryption-and-decryption/
+ // 16-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3,
+ // (byte)0xF3, (byte)0x3C, (byte)0x23, (byte)0xB9,
+ // (byte)0x9E, (byte)0xC5, (byte)0x77, (byte)0x0B033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(16);
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("AES/GCM/NOPADDING");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ javax.crypto.spec.GCMParameterSpec paramSpec =
+ new javax.crypto.spec.GCMParameterSpec(16 * 8, iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Crypto Test javax.crypto.Cipher.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00055.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00055.java
new file mode 100644
index 0000000000000000000000000000000000000000..d5d897f86113fd085e43e6cf617e2f33fc270e8a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00055.java
@@ -0,0 +1,153 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00055")
+public class BenchmarkTest00055 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00055", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/crypto-00/BenchmarkTest00055.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00055")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00056.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00056.java
new file mode 100644
index 0000000000000000000000000000000000000000..c9c70e4f1fe79c225eec5aa3d99877ccf6df0c8b
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00056.java
@@ -0,0 +1,163 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00056")
+public class BenchmarkTest00056 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00056", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/crypto-00/BenchmarkTest00056.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00056")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00057.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00057.java
new file mode 100644
index 0000000000000000000000000000000000000000..37ea1d556629e643e9cc276728ae4adad5254d60
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00057.java
@@ -0,0 +1,124 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00057")
+public class BenchmarkTest00057 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00057", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/crypto-00/BenchmarkTest00057.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00057")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException
+ | java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00058.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00058.java
new file mode 100644
index 0000000000000000000000000000000000000000..280b3aea3099b88af17e22aa4b5a9221a4fec352
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00058.java
@@ -0,0 +1,111 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00058")
+public class BenchmarkTest00058 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00058", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/crypto-00/BenchmarkTest00058.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00058")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance(
+ "AES/CCM/NoPadding", java.security.Security.getProvider("BC"));
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00059.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00059.java
new file mode 100644
index 0000000000000000000000000000000000000000..a85dc591556398fdaad8a82fb10566ce586eb96f
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00059.java
@@ -0,0 +1,121 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00059")
+public class BenchmarkTest00059 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00059", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/crypto-00/BenchmarkTest00059.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00059")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ StringBuilder sbxyz22532 = new StringBuilder(param);
+ String bar = sbxyz22532.append("_SafeStuff").toString();
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ // java.security.SecureRandom random = new java.security.SecureRandom();
+ // byte[] iv = random.generateSeed(16);
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg2", "AES/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00060.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00060.java
new file mode 100644
index 0000000000000000000000000000000000000000..7e4bf92f193784b49674921faebeebae88287da0
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00060.java
@@ -0,0 +1,74 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00060")
+public class BenchmarkTest00060 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00060", "FileName");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00060.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00060")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR), bar);
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00061.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00061.java
new file mode 100644
index 0000000000000000000000000000000000000000..a14335e7daee0923760947e7ce4d61061b32fbb1
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00061.java
@@ -0,0 +1,72 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00061")
+public class BenchmarkTest00061 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00061", "FileName");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00061.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00061")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ java.io.File fileTarget = new java.io.File(bar, "/Test.txt");
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00062.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00062.java
new file mode 100644
index 0000000000000000000000000000000000000000..53207e4e782208a18a1eabbd8df41ee8afac0b56
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00062.java
@@ -0,0 +1,93 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00062")
+public class BenchmarkTest00062 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00062", "FileName");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00062.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00062")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map77232 = new java.util.HashMap();
+ map77232.put("keyA-77232", "a-Value"); // put some stuff in the collection
+ map77232.put("keyB-77232", param); // put it in a collection
+ map77232.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map77232.get("keyB-77232"); // get it back out
+
+ String fileName = null;
+ java.io.FileInputStream fis = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+ fis = new java.io.FileInputStream(new java.io.File(fileName));
+ byte[] b = new byte[1000];
+ int size = fis.read(b);
+ response.getWriter()
+ .println(
+ "The beginning of file: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
+ + "' is:\n\n"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(b, 0, size)));
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileInputStream on file: '" + fileName + "'");
+ response.getWriter()
+ .println(
+ "Problem getting FileInputStream: "
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(e.getMessage()));
+ } finally {
+ if (fis != null) {
+ try {
+ fis.close();
+ fis = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00063.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00063.java
new file mode 100644
index 0000000000000000000000000000000000000000..42b5a217d70edb5a7488b13e7a2f3fb6bfc9a58c
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00063.java
@@ -0,0 +1,93 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00063")
+public class BenchmarkTest00063 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00063", "FileName");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00063.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00063")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ String fileName = null;
+ java.io.FileInputStream fis = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+ fis = new java.io.FileInputStream(new java.io.File(fileName));
+ byte[] b = new byte[1000];
+ int size = fis.read(b);
+ response.getWriter()
+ .println(
+ "The beginning of file: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
+ + "' is:\n\n"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(b, 0, size)));
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileInputStream on file: '" + fileName + "'");
+ response.getWriter()
+ .println(
+ "Problem getting FileInputStream: "
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(e.getMessage()));
+ } finally {
+ if (fis != null) {
+ try {
+ fis.close();
+ fis = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00064.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00064.java
new file mode 100644
index 0000000000000000000000000000000000000000..ffefa29f00a445ae0d93dd9dcf4838f868411def
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00064.java
@@ -0,0 +1,80 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00064")
+public class BenchmarkTest00064 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00064", "FileName");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00064.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00064")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ String fileName = null;
+ java.io.FileOutputStream fos = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+
+ fos = new java.io.FileOutputStream(fileName);
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
+ } finally {
+ if (fos != null) {
+ try {
+ fos.close();
+ fos = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00065.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00065.java
new file mode 100644
index 0000000000000000000000000000000000000000..e497651fab4aff1dc164d3d7acb79f7f7c8433c5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00065.java
@@ -0,0 +1,93 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00065")
+public class BenchmarkTest00065 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00065", "FileName");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/pathtraver-00/BenchmarkTest00065.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00065")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ String fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+ java.io.InputStream is = null;
+
+ try {
+ java.nio.file.Path path = java.nio.file.Paths.get(fileName);
+ is = java.nio.file.Files.newInputStream(path, java.nio.file.StandardOpenOption.READ);
+ byte[] b = new byte[1000];
+ int size = is.read(b);
+ response.getWriter()
+ .println(
+ "The beginning of file: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
+ + "' is:\n\n");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(new String(b, 0, size)));
+ is.close();
+ } catch (Exception e) {
+ System.out.println("Couldn't open InputStream on file: '" + fileName + "'");
+ response.getWriter()
+ .println(
+ "Problem getting InputStream: "
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(e.getMessage()));
+ } finally {
+ if (is != null) {
+ try {
+ is.close();
+ is = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00066.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00066.java
new file mode 100644
index 0000000000000000000000000000000000000000..da8f92cb816b05248424cd9d6025718cb8fb496d
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00066.java
@@ -0,0 +1,103 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00066")
+public class BenchmarkTest00066 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00066", "anything");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00066.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00066")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ double value = java.lang.Math.random();
+ String rememberMeKey = Double.toString(value).substring(2); // Trim off the 0. at the front.
+
+ String user = "Doug";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ response.getWriter().println("Weak Randomness Test java.lang.Math.random() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00067.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00067.java
new file mode 100644
index 0000000000000000000000000000000000000000..56dbcf00519d9293a5eba9249810391be1d98137
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00067.java
@@ -0,0 +1,119 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00067")
+public class BenchmarkTest00067 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00067", "anything");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00067.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00067")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ // Chain a bunch of propagators in sequence
+ String a71153 = param; // assign
+ StringBuilder b71153 = new StringBuilder(a71153); // stick in stringbuilder
+ b71153.append(" SafeStuff"); // append some safe content
+ b71153.replace(
+ b71153.length() - "Chars".length(),
+ b71153.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map71153 = new java.util.HashMap();
+ map71153.put("key71153", b71153.toString()); // put in a collection
+ String c71153 = (String) map71153.get("key71153"); // get it back out
+ String d71153 = c71153.substring(0, c71153.length() - 1); // extract most of it
+ String e71153 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d71153.getBytes()))); // B64 encode and decode it
+ String f71153 = e71153.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g71153 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g71153); // reflection
+
+ double value = java.lang.Math.random();
+ String rememberMeKey = Double.toString(value).substring(2); // Trim off the 0. at the front.
+
+ String user = "Doug";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ response.getWriter().println("Weak Randomness Test java.lang.Math.random() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00068.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00068.java
new file mode 100644
index 0000000000000000000000000000000000000000..2bb80145d1508c99c9df6d0597cef4edeaa3dbb5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00068.java
@@ -0,0 +1,103 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00068")
+public class BenchmarkTest00068 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00068", "anything");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00068.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00068")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ double value = java.lang.Math.random();
+ String rememberMeKey = Double.toString(value).substring(2); // Trim off the 0. at the front.
+
+ String user = "Doug";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ response.getWriter().println("Weak Randomness Test java.lang.Math.random() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00069.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00069.java
new file mode 100644
index 0000000000000000000000000000000000000000..c5203ce5c748a92df2fb605cfa265a72aa4b4b7f
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00069.java
@@ -0,0 +1,116 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00069")
+public class BenchmarkTest00069 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00069", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00069.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00069")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ java.security.Provider[] provider = java.security.Security.getProviders();
+ java.security.MessageDigest md;
+
+ try {
+ if (provider.length > 1) {
+
+ md = java.security.MessageDigest.getInstance("sha-384", provider[0]);
+ } else {
+ md = java.security.MessageDigest.getInstance("sha-384", "SUN");
+ }
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00070.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00070.java
new file mode 100644
index 0000000000000000000000000000000000000000..36ed68a4325b7c5325672d5de2921811dd020885
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00070.java
@@ -0,0 +1,108 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00070")
+public class BenchmarkTest00070 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00070", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00070.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00070")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ try {
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance("SHA1", "SUN");
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.lang.String)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.lang.String)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00071.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00071.java
new file mode 100644
index 0000000000000000000000000000000000000000..9489c77a0627bd96ace7bf416ac05e8d9fc34537
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00071.java
@@ -0,0 +1,108 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00071")
+public class BenchmarkTest00071 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00071", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00071.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00071")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ try {
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance("SHA1", "SUN");
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.lang.String)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.lang.String)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00072.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00072.java
new file mode 100644
index 0000000000000000000000000000000000000000..c64b57e688ad269e6cfed250bd32190cb9f907bc
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00072.java
@@ -0,0 +1,106 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00072")
+public class BenchmarkTest00072 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00072", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00072.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00072")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ try {
+ java.security.MessageDigest md =
+ java.security.MessageDigest.getInstance("SHA-512", "SUN");
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.lang.String)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.lang.String)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00073.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00073.java
new file mode 100644
index 0000000000000000000000000000000000000000..d207d78d97631b6b987f05e5fe9d2d3fa1b16f5a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00073.java
@@ -0,0 +1,117 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00073")
+public class BenchmarkTest00073 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00073", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00073.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00073")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(1); // condition 'B', which is safe
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bob";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bob's your uncle";
+ break;
+ }
+
+ try {
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance("MD5");
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00074.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00074.java
new file mode 100644
index 0000000000000000000000000000000000000000..0eb3226b36ff5c1067ed65606ad17198aab0d978
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00074.java
@@ -0,0 +1,107 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00074")
+public class BenchmarkTest00074 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00074", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00074.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00074")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map98790 = new java.util.HashMap();
+ map98790.put("keyA-98790", "a-Value"); // put some stuff in the collection
+ map98790.put("keyB-98790", param); // put it in a collection
+ map98790.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map98790.get("keyB-98790"); // get it back out
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00075.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00075.java
new file mode 100644
index 0000000000000000000000000000000000000000..29951fc1cd5ef9b1844a5820305e2506f5dc539c
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00075.java
@@ -0,0 +1,107 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00075")
+public class BenchmarkTest00075 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00075", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00075.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00075")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg2", "SHA5");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00076.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00076.java
new file mode 100644
index 0000000000000000000000000000000000000000..8be4ff3b5cd1c495eb925ab319e588da6471051a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00076.java
@@ -0,0 +1,121 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00076")
+public class BenchmarkTest00076 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00076", "someSecret");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/hash-00/BenchmarkTest00076.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00076")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg2", "SHA5");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00077.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00077.java
new file mode 100644
index 0000000000000000000000000000000000000000..757ccabf18873c4c2d2d0892d8b8ff528c22879a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00077.java
@@ -0,0 +1,91 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00077")
+public class BenchmarkTest00077 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00077", "ECHOOO");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/cmdi-00/BenchmarkTest00077.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00077")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ java.util.List argList = new java.util.ArrayList();
+
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ argList.add("cmd.exe");
+ argList.add("/c");
+ } else {
+ argList.add("sh");
+ argList.add("-c");
+ }
+ argList.add("echo " + bar);
+
+ ProcessBuilder pb = new ProcessBuilder(argList);
+
+ try {
+ Process p = pb.start();
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println(
+ "Problem executing cmdi - java.lang.ProcessBuilder(java.util.List) Test Case");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00078.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00078.java
new file mode 100644
index 0000000000000000000000000000000000000000..e4fb3a4773bcf2c893f5727c565566a212c63d38
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00078.java
@@ -0,0 +1,105 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00078")
+public class BenchmarkTest00078 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00078", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00078.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00078")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ float rand = new java.util.Random().nextFloat();
+ String rememberMeKey = Float.toString(rand).substring(2); // Trim off the 0. at the front.
+
+ String user = "Floyd";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextFloat() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00079.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00079.java
new file mode 100644
index 0000000000000000000000000000000000000000..384f1f07efb05d8909f8781ad1e52aca3bb85ce0
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00079.java
@@ -0,0 +1,103 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00079")
+public class BenchmarkTest00079 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00079", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00079.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00079")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map18384 = new java.util.HashMap();
+ map18384.put("keyA-18384", "a-Value"); // put some stuff in the collection
+ map18384.put("keyB-18384", param); // put it in a collection
+ map18384.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map18384.get("keyB-18384"); // get it back out
+
+ float rand = new java.util.Random().nextFloat();
+ String rememberMeKey = Float.toString(rand).substring(2); // Trim off the 0. at the front.
+
+ String user = "Floyd";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextFloat() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00080.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00080.java
new file mode 100644
index 0000000000000000000000000000000000000000..52844a8ddb438f8f69cce089d0b7f553266dec44
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00080.java
@@ -0,0 +1,98 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00080")
+public class BenchmarkTest00080 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00080", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00080.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00080")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = org.springframework.web.util.HtmlUtils.htmlEscape(param);
+
+ float rand = new java.util.Random().nextFloat();
+ String rememberMeKey = Float.toString(rand).substring(2); // Trim off the 0. at the front.
+
+ String user = "Floyd";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextFloat() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00081.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00081.java
new file mode 100644
index 0000000000000000000000000000000000000000..2d31f310fe54fcdff48298bc64984a4bffb63720
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00081.java
@@ -0,0 +1,98 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00081")
+public class BenchmarkTest00081 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00081", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00081.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00081")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = org.springframework.web.util.HtmlUtils.htmlEscape(param);
+
+ double stuff = new java.util.Random().nextGaussian();
+ String rememberMeKey = Double.toString(stuff).substring(2); // Trim off the 0. at the front.
+
+ String user = "Gayle";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter()
+ .println("Weak Randomness Test java.util.Random.nextGaussian() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00082.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00082.java
new file mode 100644
index 0000000000000000000000000000000000000000..1d2ffbb1f3c1cde8f5cfa27557621573241a213b
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00082.java
@@ -0,0 +1,98 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00082")
+public class BenchmarkTest00082 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00082", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00082.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00082")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ StringBuilder sbxyz58640 = new StringBuilder(param);
+ String bar = sbxyz58640.append("_SafeStuff").toString();
+
+ int randNumber = new java.util.Random().nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "Inga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00083.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00083.java
new file mode 100644
index 0000000000000000000000000000000000000000..faf3612219dd2150f1a8022a9c2bf9399ab31666
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00083.java
@@ -0,0 +1,102 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00083")
+public class BenchmarkTest00083 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00083", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00083.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00083")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ int randNumber = new java.util.Random().nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "Inga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00084.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00084.java
new file mode 100644
index 0000000000000000000000000000000000000000..974d949b731ef48f98eba4eeea029ccc5db817d8
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00084.java
@@ -0,0 +1,99 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00084")
+public class BenchmarkTest00084 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00084", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00084.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00084")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ int r = new java.util.Random().nextInt();
+ String rememberMeKey = Integer.toString(r);
+
+ String user = "Ingrid";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00085.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00085.java
new file mode 100644
index 0000000000000000000000000000000000000000..a20ad4661e1234e67aacc0c4bd1efdbbbf184775
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00085.java
@@ -0,0 +1,103 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00085")
+public class BenchmarkTest00085 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00085", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00085.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00085")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map43974 = new java.util.HashMap();
+ map43974.put("keyA-43974", "a-Value"); // put some stuff in the collection
+ map43974.put("keyB-43974", param); // put it in a collection
+ map43974.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map43974.get("keyB-43974"); // get it back out
+
+ long l = new java.util.Random().nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "Logan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00086.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00086.java
new file mode 100644
index 0000000000000000000000000000000000000000..fe3e074a7b038c1756b4b1880cbab7f79dea055a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00086.java
@@ -0,0 +1,103 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00086")
+public class BenchmarkTest00086 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00086", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00086.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00086")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ long l = new java.util.Random().nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "Logan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00087.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00087.java
new file mode 100644
index 0000000000000000000000000000000000000000..87912cb4be7011118919828a577cd91a66db9600
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00087.java
@@ -0,0 +1,85 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/securecookie-00/BenchmarkTest00087")
+public class BenchmarkTest00087 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00087", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/securecookie-00/BenchmarkTest00087.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00087")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ byte[] input = new byte[1000];
+ String str = "?";
+ Object inputParam = param;
+ if (inputParam instanceof String) str = ((String) inputParam);
+ if (inputParam instanceof java.io.InputStream) {
+ int i = ((java.io.InputStream) inputParam).read(input);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ str = new String(input, 0, i);
+ }
+ if ("".equals(str)) str = "No cookie value supplied";
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
+
+ cookie.setSecure(false);
+ cookie.setHttpOnly(true);
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ response.addCookie(cookie);
+
+ response.getWriter()
+ .println(
+ "Created cookie: 'SomeCookie': with value: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
+ + "' and secure flag set to: false");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00088.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00088.java
new file mode 100644
index 0000000000000000000000000000000000000000..331aef2a690daac337186acedfbbfbb22fb6ecd0
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00088.java
@@ -0,0 +1,78 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/securecookie-00/BenchmarkTest00088")
+public class BenchmarkTest00088 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00088", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/securecookie-00/BenchmarkTest00088.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00088")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = org.owasp.esapi.ESAPI.encoder().encodeForHTML(param);
+
+ byte[] input = new byte[1000];
+ String str = "?";
+ Object inputParam = param;
+ if (inputParam instanceof String) str = ((String) inputParam);
+ if (inputParam instanceof java.io.InputStream) {
+ int i = ((java.io.InputStream) inputParam).read(input);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ str = new String(input, 0, i);
+ }
+ if ("".equals(str)) str = "No cookie value supplied";
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
+
+ cookie.setSecure(true);
+ cookie.setHttpOnly(true);
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ response.addCookie(cookie);
+
+ response.getWriter()
+ .println(
+ "Created cookie: 'SomeCookie': with value: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
+ + "' and secure flag set to: true");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00089.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00089.java
new file mode 100644
index 0000000000000000000000000000000000000000..e97f84005030daedacd845744f70c7ca90acc8a2
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00089.java
@@ -0,0 +1,83 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/securecookie-00/BenchmarkTest00089")
+public class BenchmarkTest00089 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00089", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/securecookie-00/BenchmarkTest00089.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00089")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ byte[] input = new byte[1000];
+ String str = "?";
+ Object inputParam = param;
+ if (inputParam instanceof String) str = ((String) inputParam);
+ if (inputParam instanceof java.io.InputStream) {
+ int i = ((java.io.InputStream) inputParam).read(input);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ str = new String(input, 0, i);
+ }
+ if ("".equals(str)) str = "No cookie value supplied";
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
+
+ cookie.setSecure(true);
+ cookie.setHttpOnly(true);
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ response.addCookie(cookie);
+
+ response.getWriter()
+ .println(
+ "Created cookie: 'SomeCookie': with value: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
+ + "' and secure flag set to: true");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00090.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00090.java
new file mode 100644
index 0000000000000000000000000000000000000000..0156bdf294a2a6f7d8ec3a8fd4500e3fe55d5c24
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00090.java
@@ -0,0 +1,72 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00090")
+public class BenchmarkTest00090 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00090", "ls");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/cmdi-00/BenchmarkTest00090.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00090")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ String cmd = "";
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("echo");
+ }
+
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(cmd + bar);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00091.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00091.java
new file mode 100644
index 0000000000000000000000000000000000000000..58929e4c661019b7192cbd9316c3d712a8bc2396
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00091.java
@@ -0,0 +1,67 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00091")
+public class BenchmarkTest00091 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00091", "FOO%3Decho+Injection");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/cmdi-00/BenchmarkTest00091.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00091")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = param;
+
+ String cmd =
+ org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
+ this.getClass().getClassLoader());
+ String[] args = {cmd};
+ String[] argsEnv = {bar};
+
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(args, argsEnv);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00092.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00092.java
new file mode 100644
index 0000000000000000000000000000000000000000..5f7ab3d13e5728255156efbf37804cec6be96e47
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00092.java
@@ -0,0 +1,86 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00092")
+public class BenchmarkTest00092 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00092", "FOO%3Decho+Injection");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/cmdi-00/BenchmarkTest00092.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00092")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ String cmd =
+ org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
+ this.getClass().getClassLoader());
+ String[] args = {cmd};
+ String[] argsEnv = {bar};
+
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(args, argsEnv);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00093.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00093.java
new file mode 100644
index 0000000000000000000000000000000000000000..2791d1bd4c18f6c37ee3486afb480fc6d67a4319
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00093.java
@@ -0,0 +1,78 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00093")
+public class BenchmarkTest00093 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00093", "ls");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/cmdi-00/BenchmarkTest00093.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00093")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ String cmd = "";
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("echo");
+ }
+
+ String[] argsEnv = {"Foo=bar"};
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(cmd + bar, argsEnv);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00094.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00094.java
new file mode 100644
index 0000000000000000000000000000000000000000..f84e02620544e07886411f742d7ea075e778bab9
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00094.java
@@ -0,0 +1,112 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00094")
+public class BenchmarkTest00094 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00094", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00094.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00094")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map52993 = new java.util.HashMap();
+ map52993.put("keyA-52993", "a_Value"); // put some stuff in the collection
+ map52993.put("keyB-52993", param); // put it in a collection
+ map52993.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map52993.get("keyB-52993"); // get it back out
+ bar = (String) map52993.get("keyA-52993"); // get safe value back out
+
+ try {
+ double rand = java.security.SecureRandom.getInstance("SHA1PRNG").nextDouble();
+
+ String rememberMeKey =
+ Double.toString(rand).substring(2); // Trim off the 0. at the front.
+
+ String user = "SafeDonna";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextDouble() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextDouble() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00095.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00095.java
new file mode 100644
index 0000000000000000000000000000000000000000..4a7921b4815d448e5e96589abfc585b0b1b8f1b7
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00095.java
@@ -0,0 +1,109 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00095")
+public class BenchmarkTest00095 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00095", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00095.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00095")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map45268 = new java.util.HashMap();
+ map45268.put("keyA-45268", "a-Value"); // put some stuff in the collection
+ map45268.put("keyB-45268", param); // put it in a collection
+ map45268.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map45268.get("keyB-45268"); // get it back out
+
+ try {
+ double stuff = java.security.SecureRandom.getInstance("SHA1PRNG").nextGaussian();
+ String rememberMeKey =
+ Double.toString(stuff).substring(2); // Trim off the 0. at the front.
+
+ String user = "SafeGayle";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextGaussian() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextGaussian() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00096.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00096.java
new file mode 100644
index 0000000000000000000000000000000000000000..8f228d33fb82dd303597c710b5780875551c21c8
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00096.java
@@ -0,0 +1,108 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00096")
+public class BenchmarkTest00096 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00096", "whatever");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/weakrand-00/BenchmarkTest00096.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00096")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ try {
+ int randNumber = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "SafeInga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextInt(int) - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00097.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00097.java
new file mode 100644
index 0000000000000000000000000000000000000000..03be16501903a859794b52e28e6fdf86181b4aba
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00097.java
@@ -0,0 +1,63 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/trustbound-00/BenchmarkTest00097")
+public class BenchmarkTest00097 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00097", "color");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/trustbound-00/BenchmarkTest00097.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00097")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ // javax.servlet.http.HttpSession.putValue(java.lang.String^,java.lang.Object)
+ request.getSession().putValue(bar, "10340");
+
+ response.getWriter()
+ .println(
+ "Item: '"
+ + org.owasp.benchmark.helpers.Utils.encodeForHTML(bar)
+ + "' with value: 10340 saved in session.");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00098.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00098.java
new file mode 100644
index 0000000000000000000000000000000000000000..5220e0850eacc90335f5414fd77b7e7698536505
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00098.java
@@ -0,0 +1,58 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/trustbound-00/BenchmarkTest00098")
+public class BenchmarkTest00098 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00098", "my_user_id");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/trustbound-00/BenchmarkTest00098.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00098")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = org.apache.commons.lang.StringEscapeUtils.escapeHtml(param);
+
+ // javax.servlet.http.HttpSession.putValue(java.lang.String,java.lang.Object^)
+ request.getSession().putValue("userid", bar);
+
+ response.getWriter()
+ .println(
+ "Item: 'userid' with value: '"
+ + org.owasp.benchmark.helpers.Utils.encodeForHTML(bar)
+ + "' saved in session.");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00099.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00099.java
new file mode 100644
index 0000000000000000000000000000000000000000..82c91a7c0e7414df28b42e0844ff42c5130835e1
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00099.java
@@ -0,0 +1,68 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/trustbound-00/BenchmarkTest00099")
+public class BenchmarkTest00099 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00099", "my_userid");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/trustbound-00/BenchmarkTest00099.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00099")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ // javax.servlet.http.HttpSession.setAttribute(java.lang.String,java.lang.Object^)
+ request.getSession().setAttribute("userid", bar);
+
+ response.getWriter()
+ .println(
+ "Item: 'userid' with value: '"
+ + org.owasp.benchmark.helpers.Utils.encodeForHTML(bar)
+ + "' saved in session.");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00100.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00100.java
new file mode 100644
index 0000000000000000000000000000000000000000..8df378477b615ab000cf580046cfc0cd1fe5e0ba
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00100.java
@@ -0,0 +1,75 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00100")
+public class BenchmarkTest00100 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00100", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00100.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00100")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map72344 = new java.util.HashMap();
+ map72344.put("keyA-72344", "a-Value"); // put some stuff in the collection
+ map72344.put("keyB-72344", param); // put it in a collection
+ map72344.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map72344.get("keyB-72344"); // get it back out
+
+ String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.PreparedStatement statement =
+ connection.prepareStatement(
+ sql,
+ java.sql.ResultSet.TYPE_FORWARD_ONLY,
+ java.sql.ResultSet.CONCUR_READ_ONLY,
+ java.sql.ResultSet.CLOSE_CURSORS_AT_COMMIT);
+ statement.setString(1, "foo");
+ statement.execute();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00101.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00101.java
new file mode 100644
index 0000000000000000000000000000000000000000..2fbcba61fa3fa3cdd41ace334bd8020ab9f986be
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00101.java
@@ -0,0 +1,76 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00101")
+public class BenchmarkTest00101 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00101", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00101.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00101")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.PreparedStatement statement =
+ connection.prepareStatement(sql, new String[] {"Column1", "Column2"});
+ statement.setString(1, "foo");
+ statement.execute();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00102.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00102.java
new file mode 100644
index 0000000000000000000000000000000000000000..2d1c8b8cb629fe5e2bf84f02f9ae58037420596f
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00102.java
@@ -0,0 +1,73 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00102")
+public class BenchmarkTest00102 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00102", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00102.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00102")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ String sql =
+ "SELECT TOP 1 userid from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+ try {
+ java.util.Map results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForMap(sql);
+ response.getWriter().println("Your results are: ");
+
+ // System.out.println("Your results are");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(results.toString()));
+ // System.out.println(results.toString());
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00103.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00103.java
new file mode 100644
index 0000000000000000000000000000000000000000..960f479e0b58f9d4f05ca717c12e5698373d6c4e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00103.java
@@ -0,0 +1,77 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00103")
+public class BenchmarkTest00103 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00103", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00103.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00103")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ String sql =
+ "SELECT TOP 1 USERNAME from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+ try {
+ Object results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForObject(
+ sql, new Object[] {}, String.class);
+ response.getWriter().println("Your results are: ");
+
+ // System.out.println("Your results are");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(results.toString()));
+ // System.out.println(results.toString());
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00104.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00104.java
new file mode 100644
index 0000000000000000000000000000000000000000..7a2c016e6aa8d0ef39a133b932ca5eef4bc767b6
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00104.java
@@ -0,0 +1,70 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00104")
+public class BenchmarkTest00104 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00104", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00104.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00104")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ try {
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.batchUpdate(sql);
+ response.getWriter()
+ .println(
+ "No results can be displayed for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
+ + "
"
+ + " because the Spring batchUpdate method doesn't return results.");
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00105.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00105.java
new file mode 100644
index 0000000000000000000000000000000000000000..1f06964bfa09c39e8eb93ca936dfe2fbbe649a49
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00105.java
@@ -0,0 +1,69 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00105")
+public class BenchmarkTest00105 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00105", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00105.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00105")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ statement.addBatch(sql);
+ int[] counts = statement.executeBatch();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(sql, counts, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00106.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00106.java
new file mode 100644
index 0000000000000000000000000000000000000000..97f46bf28ce5767e9a3888844d0f0a5654d295f1
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00106.java
@@ -0,0 +1,73 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00106")
+public class BenchmarkTest00106 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00106", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00106.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00106")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ statement.execute(sql, java.sql.Statement.RETURN_GENERATED_KEYS);
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00107.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00107.java
new file mode 100644
index 0000000000000000000000000000000000000000..a55257059219cc070568e125a25dd79a25dbeca3
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00107.java
@@ -0,0 +1,84 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00107")
+public class BenchmarkTest00107 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00107", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00107.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00107")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ // Chain a bunch of propagators in sequence
+ String a18521 = param; // assign
+ StringBuilder b18521 = new StringBuilder(a18521); // stick in stringbuilder
+ b18521.append(" SafeStuff"); // append some safe content
+ b18521.replace(
+ b18521.length() - "Chars".length(),
+ b18521.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map18521 = new java.util.HashMap();
+ map18521.put("key18521", b18521.toString()); // put in a collection
+ String c18521 = (String) map18521.get("key18521"); // get it back out
+ String d18521 = c18521.substring(0, c18521.length() - 1); // extract most of it
+ String e18521 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d18521.getBytes()))); // B64 encode and decode it
+ String f18521 = e18521.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g18521 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g18521); // reflection
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ statement.execute(sql, java.sql.Statement.RETURN_GENERATED_KEYS);
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00108.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00108.java
new file mode 100644
index 0000000000000000000000000000000000000000..8ab071011c5f3617a27483acea76c217924c873e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00108.java
@@ -0,0 +1,82 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00108")
+public class BenchmarkTest00108 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00108", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00108.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00108")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ statement.execute(sql, new int[] {1, 2});
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00109.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00109.java
new file mode 100644
index 0000000000000000000000000000000000000000..0ca4f0cca32778eafc299ca7631f03ad27d8fad5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00109.java
@@ -0,0 +1,70 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00109")
+public class BenchmarkTest00109 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00109", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00109.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00109")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ statement.execute(sql, new String[] {"username", "password"});
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00110.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00110.java
new file mode 100644
index 0000000000000000000000000000000000000000..43abb0d113982fc8a800e7aa5fbcabe6d3450969
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00110.java
@@ -0,0 +1,84 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00110")
+public class BenchmarkTest00110 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00110", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00110.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00110")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ // Chain a bunch of propagators in sequence
+ String a69840 = param; // assign
+ StringBuilder b69840 = new StringBuilder(a69840); // stick in stringbuilder
+ b69840.append(" SafeStuff"); // append some safe content
+ b69840.replace(
+ b69840.length() - "Chars".length(),
+ b69840.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map69840 = new java.util.HashMap();
+ map69840.put("key69840", b69840.toString()); // put in a collection
+ String c69840 = (String) map69840.get("key69840"); // get it back out
+ String d69840 = c69840.substring(0, c69840.length() - 1); // extract most of it
+ String e69840 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d69840.getBytes()))); // B64 encode and decode it
+ String f69840 = e69840.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g69840 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g69840); // reflection
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ statement.execute(sql, new String[] {"username", "password"});
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00111.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00111.java
new file mode 100644
index 0000000000000000000000000000000000000000..5f613be3317c6507c79a472a9efe9df629ab03e6
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00111.java
@@ -0,0 +1,73 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00111")
+public class BenchmarkTest00111 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00111", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00111.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00111")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql);
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00112.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00112.java
new file mode 100644
index 0000000000000000000000000000000000000000..cc35f6e70616ccf205244e67fb28fc2901071016
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00112.java
@@ -0,0 +1,65 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00112")
+public class BenchmarkTest00112 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00112", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00112.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00112")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql);
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00113.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00113.java
new file mode 100644
index 0000000000000000000000000000000000000000..c69ce2975932c91cb8570ba8c96ec6710b248063
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00113.java
@@ -0,0 +1,69 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00113")
+public class BenchmarkTest00113 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00113", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00113.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00113")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map21657 = new java.util.HashMap();
+ map21657.put("keyA-21657", "a_Value"); // put some stuff in the collection
+ map21657.put("keyB-21657", param); // put it in a collection
+ map21657.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map21657.get("keyB-21657"); // get it back out
+ bar = (String) map21657.get("keyA-21657"); // get safe value back out
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql);
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00114.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00114.java
new file mode 100644
index 0000000000000000000000000000000000000000..04d27c5ad9c7965161079cc08a91655a412bb3d3
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00114.java
@@ -0,0 +1,68 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00114")
+public class BenchmarkTest00114 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00114", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00114.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00114")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql, new int[] {1, 2});
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00115.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00115.java
new file mode 100644
index 0000000000000000000000000000000000000000..9988bd9022b3597fff721842950db397b40cb434
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00115.java
@@ -0,0 +1,68 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00115")
+public class BenchmarkTest00115 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00115", "bar");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/sqli-00/BenchmarkTest00115.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00115")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map11928 = new java.util.HashMap();
+ map11928.put("keyA-11928", "a-Value"); // put some stuff in the collection
+ map11928.put("keyB-11928", param); // put it in a collection
+ map11928.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map11928.get("keyB-11928"); // get it back out
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql, new String[] {"USERNAME", "PASSWORD"});
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00116.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00116.java
new file mode 100644
index 0000000000000000000000000000000000000000..66496ddeb8d9c96fe1d696337fe4c544ebeaf4fa
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00116.java
@@ -0,0 +1,92 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xpathi-00/BenchmarkTest00116")
+public class BenchmarkTest00116 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00116", "2222");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/xpathi-00/BenchmarkTest00116.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00116")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar = "safe!";
+ java.util.HashMap map51005 = new java.util.HashMap();
+ map51005.put("keyA-51005", "a_Value"); // put some stuff in the collection
+ map51005.put("keyB-51005", param); // put it in a collection
+ map51005.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map51005.get("keyB-51005"); // get it back out
+ bar = (String) map51005.get("keyA-51005"); // get safe value back out
+
+ try {
+ java.io.FileInputStream file =
+ new java.io.FileInputStream(
+ org.owasp.benchmark.helpers.Utils.getFileFromClasspath(
+ "employees.xml", this.getClass().getClassLoader()));
+ javax.xml.parsers.DocumentBuilderFactory builderFactory =
+ javax.xml.parsers.DocumentBuilderFactory.newInstance();
+ // Prevent XXE
+ builderFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
+ javax.xml.parsers.DocumentBuilder builder = builderFactory.newDocumentBuilder();
+ org.w3c.dom.Document xmlDocument = builder.parse(file);
+ javax.xml.xpath.XPathFactory xpf = javax.xml.xpath.XPathFactory.newInstance();
+ javax.xml.xpath.XPath xp = xpf.newXPath();
+
+ String expression = "/Employees/Employee[@emplid='" + bar + "']";
+ org.w3c.dom.NodeList nodeList =
+ (org.w3c.dom.NodeList)
+ xp.compile(expression)
+ .evaluate(xmlDocument, javax.xml.xpath.XPathConstants.NODESET);
+
+ response.getWriter().println("Your query results are:
");
+
+ for (int i = 0; i < nodeList.getLength(); i++) {
+ org.w3c.dom.Element value = (org.w3c.dom.Element) nodeList.item(i);
+ response.getWriter().println(value.getTextContent() + "
");
+ }
+ } catch (javax.xml.xpath.XPathExpressionException
+ | javax.xml.parsers.ParserConfigurationException
+ | org.xml.sax.SAXException e) {
+ response.getWriter()
+ .println(
+ "Error parsing XPath input: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(bar)
+ + "'");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00117.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00117.java
new file mode 100644
index 0000000000000000000000000000000000000000..30d823bfcb73b29c196b1447d5798dedf35ae16b
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00117.java
@@ -0,0 +1,91 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xpathi-00/BenchmarkTest00117")
+public class BenchmarkTest00117 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00117", "2222");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/xpathi-00/BenchmarkTest00117.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00117")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ try {
+ java.io.FileInputStream file =
+ new java.io.FileInputStream(
+ org.owasp.benchmark.helpers.Utils.getFileFromClasspath(
+ "employees.xml", this.getClass().getClassLoader()));
+ javax.xml.parsers.DocumentBuilderFactory builderFactory =
+ javax.xml.parsers.DocumentBuilderFactory.newInstance();
+ // Prevent XXE
+ builderFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
+ javax.xml.parsers.DocumentBuilder builder = builderFactory.newDocumentBuilder();
+ org.w3c.dom.Document xmlDocument = builder.parse(file);
+ javax.xml.xpath.XPathFactory xpf = javax.xml.xpath.XPathFactory.newInstance();
+ javax.xml.xpath.XPath xp = xpf.newXPath();
+
+ String expression = "/Employees/Employee[@emplid='" + bar + "']";
+ org.w3c.dom.NodeList nodeList =
+ (org.w3c.dom.NodeList)
+ xp.compile(expression)
+ .evaluate(xmlDocument, javax.xml.xpath.XPathConstants.NODESET);
+
+ response.getWriter().println("Your query results are:
");
+
+ for (int i = 0; i < nodeList.getLength(); i++) {
+ org.w3c.dom.Element value = (org.w3c.dom.Element) nodeList.item(i);
+ response.getWriter().println(value.getTextContent() + "
");
+ }
+ } catch (javax.xml.xpath.XPathExpressionException
+ | javax.xml.parsers.ParserConfigurationException
+ | org.xml.sax.SAXException e) {
+ response.getWriter()
+ .println(
+ "Error parsing XPath input: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(bar)
+ + "'");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00118.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00118.java
new file mode 100644
index 0000000000000000000000000000000000000000..d55c79e3705beb9302adbeefaa1a812a60d2d053
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00118.java
@@ -0,0 +1,84 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xpathi-00/BenchmarkTest00118")
+public class BenchmarkTest00118 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+ javax.servlet.http.Cookie userCookie =
+ new javax.servlet.http.Cookie("BenchmarkTest00118", "2222");
+ userCookie.setMaxAge(60 * 3); // Store cookie for 3 minutes
+ userCookie.setSecure(true);
+ userCookie.setPath(request.getRequestURI());
+ userCookie.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ response.addCookie(userCookie);
+ javax.servlet.RequestDispatcher rd =
+ request.getRequestDispatcher("/xpathi-00/BenchmarkTest00118.html");
+ rd.include(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ javax.servlet.http.Cookie[] theCookies = request.getCookies();
+
+ String param = "noCookieValueSupplied";
+ if (theCookies != null) {
+ for (javax.servlet.http.Cookie theCookie : theCookies) {
+ if (theCookie.getName().equals("BenchmarkTest00118")) {
+ param = java.net.URLDecoder.decode(theCookie.getValue(), "UTF-8");
+ break;
+ }
+ }
+ }
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ try {
+ java.io.FileInputStream file =
+ new java.io.FileInputStream(
+ org.owasp.benchmark.helpers.Utils.getFileFromClasspath(
+ "employees.xml", this.getClass().getClassLoader()));
+ javax.xml.parsers.DocumentBuilderFactory builderFactory =
+ javax.xml.parsers.DocumentBuilderFactory.newInstance();
+ // Prevent XXE
+ builderFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
+ javax.xml.parsers.DocumentBuilder builder = builderFactory.newDocumentBuilder();
+ org.w3c.dom.Document xmlDocument = builder.parse(file);
+ javax.xml.xpath.XPathFactory xpf = javax.xml.xpath.XPathFactory.newInstance();
+ javax.xml.xpath.XPath xp = xpf.newXPath();
+
+ String expression = "/Employees/Employee[@emplid='" + bar + "']";
+ String result = xp.evaluate(expression, xmlDocument);
+
+ response.getWriter().println("Your query results are: " + result + "
");
+
+ } catch (javax.xml.xpath.XPathExpressionException
+ | javax.xml.parsers.ParserConfigurationException
+ | org.xml.sax.SAXException e) {
+ response.getWriter()
+ .println(
+ "Error parsing XPath input: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(bar)
+ + "'");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00119.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00119.java
new file mode 100644
index 0000000000000000000000000000000000000000..b068ae970922fe0e34b784658d5a7d4d67241f16
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00119.java
@@ -0,0 +1,155 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00119")
+public class BenchmarkTest00119 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00119") != null) {
+ param = request.getHeader("BenchmarkTest00119");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a8142 = param; // assign
+ StringBuilder b8142 = new StringBuilder(a8142); // stick in stringbuilder
+ b8142.append(" SafeStuff"); // append some safe content
+ b8142.replace(
+ b8142.length() - "Chars".length(),
+ b8142.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map8142 = new java.util.HashMap();
+ map8142.put("key8142", b8142.toString()); // put in a collection
+ String c8142 = (String) map8142.get("key8142"); // get it back out
+ String d8142 = c8142.substring(0, c8142.length() - 1); // extract most of it
+ String e8142 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d8142.getBytes()))); // B64 encode and decode it
+ String f8142 = e8142.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(f8142); // reflection
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance(
+ "DES/CBC/PKCS5PADDING", java.security.Security.getProvider("SunJCE"));
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00120.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00120.java
new file mode 100644
index 0000000000000000000000000000000000000000..a2cd7e27db3b8b2c464024004ec153bbd1395f6a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00120.java
@@ -0,0 +1,139 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00120")
+public class BenchmarkTest00120 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00120") != null) {
+ param = request.getHeader("BenchmarkTest00120");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = param;
+ if (param != null && param.length() > 1) {
+ StringBuilder sbxyz43804 = new StringBuilder(param);
+ bar = sbxyz43804.replace(param.length() - "Z".length(), param.length(), "Z").toString();
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance(
+ "DES/CBC/PKCS5PADDING", java.security.Security.getProvider("SunJCE"));
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00121.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00121.java
new file mode 100644
index 0000000000000000000000000000000000000000..ec02fa3554d53d051b4b511f461782fa078f2d0a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00121.java
@@ -0,0 +1,146 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00121")
+public class BenchmarkTest00121 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00121") != null) {
+ param = request.getHeader("BenchmarkTest00121");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // AES/GCM example from:
+ // https://javainterviewpoint.com/java-aes-256-gcm-encryption-and-decryption/
+ // 16-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3,
+ // (byte)0xF3, (byte)0x3C, (byte)0x23, (byte)0xB9,
+ // (byte)0x9E, (byte)0xC5, (byte)0x77, (byte)0x0B033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(16);
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("AES/GCM/NOPADDING");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ javax.crypto.spec.GCMParameterSpec paramSpec =
+ new javax.crypto.spec.GCMParameterSpec(16 * 8, iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Crypto Test javax.crypto.Cipher.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00122.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00122.java
new file mode 100644
index 0000000000000000000000000000000000000000..f960a5fe1100ccd7f7fcc65449f30c441b6a5dbb
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00122.java
@@ -0,0 +1,136 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00122")
+public class BenchmarkTest00122 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00122") != null) {
+ param = request.getHeader("BenchmarkTest00122");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // AES/GCM example from:
+ // https://javainterviewpoint.com/java-aes-256-gcm-encryption-and-decryption/
+ // 16-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3,
+ // (byte)0xF3, (byte)0x3C, (byte)0x23, (byte)0xB9,
+ // (byte)0x9E, (byte)0xC5, (byte)0x77, (byte)0x0B033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(16);
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("AES/GCM/NOPADDING");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ javax.crypto.spec.GCMParameterSpec paramSpec =
+ new javax.crypto.spec.GCMParameterSpec(16 * 8, iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Crypto Test javax.crypto.Cipher.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00123.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00123.java
new file mode 100644
index 0000000000000000000000000000000000000000..d735ad2e07a6aabe162ba4af133e75b42dc83ddb
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00123.java
@@ -0,0 +1,105 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00123")
+public class BenchmarkTest00123 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00123") != null) {
+ param = request.getHeader("BenchmarkTest00123");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = org.owasp.esapi.ESAPI.encoder().encodeForHTML(param);
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException
+ | java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00124.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00124.java
new file mode 100644
index 0000000000000000000000000000000000000000..f8abecc2857dbe8a3c0d50e513c8c59819eae447
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00124.java
@@ -0,0 +1,110 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00124")
+public class BenchmarkTest00124 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00124") != null) {
+ param = request.getHeader("BenchmarkTest00124");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException
+ | java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00125.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00125.java
new file mode 100644
index 0000000000000000000000000000000000000000..617447b92d7f52b174db7eb34db4b55b6bcdc674
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00125.java
@@ -0,0 +1,105 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00125")
+public class BenchmarkTest00125 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00125") != null) {
+ param = request.getHeader("BenchmarkTest00125");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = org.apache.commons.lang.StringEscapeUtils.escapeHtml(param);
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException
+ | java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00126.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00126.java
new file mode 100644
index 0000000000000000000000000000000000000000..a1b535f1688c77b59aeb99b7c7492773fd19c183
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00126.java
@@ -0,0 +1,107 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00126")
+public class BenchmarkTest00126 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00126") != null) {
+ param = request.getHeader("BenchmarkTest00126");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance(
+ "AES/CCM/NoPadding", java.security.Security.getProvider("BC"));
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00127.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00127.java
new file mode 100644
index 0000000000000000000000000000000000000000..81698cc4d93455dddc7ae7eac77f2a1e27b65739
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00127.java
@@ -0,0 +1,116 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00127")
+public class BenchmarkTest00127 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00127") != null) {
+ param = request.getHeader("BenchmarkTest00127");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ // java.security.SecureRandom random = new java.security.SecureRandom();
+ // byte[] iv = random.generateSeed(16);
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg2", "AES/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00128.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00128.java
new file mode 100644
index 0000000000000000000000000000000000000000..3f5114b5f19de045b585ed90b437c377f3fd2137
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00128.java
@@ -0,0 +1,111 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00128")
+public class BenchmarkTest00128 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00128") != null) {
+ param = request.getHeader("BenchmarkTest00128");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ // java.security.SecureRandom random = new java.security.SecureRandom();
+ // byte[] iv = random.generateSeed(16);
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg2", "AES/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00129.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00129.java
new file mode 100644
index 0000000000000000000000000000000000000000..46511fdadbcff77e358db199578ab2f8d3aba131
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00129.java
@@ -0,0 +1,106 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00129")
+public class BenchmarkTest00129 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00129") != null) {
+ param = request.getHeader("BenchmarkTest00129");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = org.springframework.web.util.HtmlUtils.htmlEscape(param);
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ // java.security.SecureRandom random = new java.security.SecureRandom();
+ // byte[] iv = random.generateSeed(16);
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg2", "AES/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00130.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00130.java
new file mode 100644
index 0000000000000000000000000000000000000000..0d7461e8e023f8c6d00f3e2fd9968391c8567996
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00130.java
@@ -0,0 +1,125 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00130")
+public class BenchmarkTest00130 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00130") != null) {
+ param = request.getHeader("BenchmarkTest00130");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(1); // condition 'B', which is safe
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bob";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bob's your uncle";
+ break;
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ // java.security.SecureRandom random = new java.security.SecureRandom();
+ // byte[] iv = random.generateSeed(16);
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg2", "AES/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00131.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00131.java
new file mode 100644
index 0000000000000000000000000000000000000000..cb4dec593df16a01a75cf727b09808b03fc21ccf
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00131.java
@@ -0,0 +1,70 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00131")
+public class BenchmarkTest00131 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00131") != null) {
+ param = request.getHeader("BenchmarkTest00131");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(1); // condition 'B', which is safe
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bob";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bob's your uncle";
+ break;
+ }
+
+ java.io.File fileTarget = new java.io.File(bar);
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00132.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00132.java
new file mode 100644
index 0000000000000000000000000000000000000000..3d08a703096b5bdc52cd4f3c9e2ff15ceb925cc7
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00132.java
@@ -0,0 +1,93 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00132")
+public class BenchmarkTest00132 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00132") != null) {
+ param = request.getHeader("BenchmarkTest00132");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(1); // condition 'B', which is safe
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bob";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bob's your uncle";
+ break;
+ }
+
+ String fileName = null;
+ java.io.FileInputStream fis = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+ fis = new java.io.FileInputStream(new java.io.File(fileName));
+ byte[] b = new byte[1000];
+ int size = fis.read(b);
+ response.getWriter()
+ .println(
+ "The beginning of file: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
+ + "' is:\n\n"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(b, 0, size)));
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileInputStream on file: '" + fileName + "'");
+ response.getWriter()
+ .println(
+ "Problem getting FileInputStream: "
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(e.getMessage()));
+ } finally {
+ if (fis != null) {
+ try {
+ fis.close();
+ fis = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00133.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00133.java
new file mode 100644
index 0000000000000000000000000000000000000000..70f5502de344ee1138b9422e903b405fbd11f345
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00133.java
@@ -0,0 +1,69 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00133")
+public class BenchmarkTest00133 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00133") != null) {
+ param = request.getHeader("BenchmarkTest00133");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ String fileName = null;
+ java.io.FileInputStream fis = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+ fis = new java.io.FileInputStream(fileName);
+ byte[] b = new byte[1000];
+ int size = fis.read(b);
+ response.getWriter()
+ .println(
+ "The beginning of file: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
+ + "' is:\n\n");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(new String(b, 0, size)));
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileInputStream on file: '" + fileName + "'");
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
+ } finally {
+ if (fis != null) {
+ try {
+ fis.close();
+ fis = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00134.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00134.java
new file mode 100644
index 0000000000000000000000000000000000000000..815315c36477d38f21034db8be9d887ee4cd7007
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00134.java
@@ -0,0 +1,67 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00134")
+public class BenchmarkTest00134 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00134") != null) {
+ param = request.getHeader("BenchmarkTest00134");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ String fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+
+ try (
+ // Create the file first so the test won't throw an exception if it doesn't exist.
+ // Note: Don't actually do this because this method signature could cause a tool to find
+ // THIS file constructor
+ // as a vuln, rather than the File signature we are trying to actually test.
+ // If necessary, just run the benchmark twice. The 1st run should create all the necessary
+ // files.
+ // new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar).createNewFile();
+
+ java.io.FileOutputStream fos =
+ new java.io.FileOutputStream(new java.io.FileInputStream(fileName).getFD()); ) {
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00135.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00135.java
new file mode 100644
index 0000000000000000000000000000000000000000..23f935cfdbd604ad9dd0510a18249026d8744a70
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00135.java
@@ -0,0 +1,76 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00135")
+public class BenchmarkTest00135 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00135") != null) {
+ param = request.getHeader("BenchmarkTest00135");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(1); // condition 'B', which is safe
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bob";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bob's your uncle";
+ break;
+ }
+
+ String fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+
+ try (
+ // Create the file first so the test won't throw an exception if it doesn't exist.
+ // Note: Don't actually do this because this method signature could cause a tool to find
+ // THIS file constructor
+ // as a vuln, rather than the File signature we are trying to actually test.
+ // If necessary, just run the benchmark twice. The 1st run should create all the necessary
+ // files.
+ // new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar).createNewFile();
+
+ java.io.FileOutputStream fos =
+ new java.io.FileOutputStream(new java.io.FileInputStream(fileName).getFD()); ) {
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00136.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00136.java
new file mode 100644
index 0000000000000000000000000000000000000000..eff7ba4e4c921699d7816452c2939d9f0c9b25ea
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00136.java
@@ -0,0 +1,80 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00136")
+public class BenchmarkTest00136 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00136") != null) {
+ param = request.getHeader("BenchmarkTest00136");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(1); // condition 'B', which is safe
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bob";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bob's your uncle";
+ break;
+ }
+
+ String fileName = null;
+ java.io.FileOutputStream fos = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+
+ fos = new java.io.FileOutputStream(fileName, false);
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
+ } finally {
+ if (fos != null) {
+ try {
+ fos.close();
+ fos = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00137.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00137.java
new file mode 100644
index 0000000000000000000000000000000000000000..39d5a7744be057c64e416378a943c0837aaa884b
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00137.java
@@ -0,0 +1,78 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00137")
+public class BenchmarkTest00137 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00137") != null) {
+ param = request.getHeader("BenchmarkTest00137");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map53289 = new java.util.HashMap();
+ map53289.put("keyA-53289", "a_Value"); // put some stuff in the collection
+ map53289.put("keyB-53289", param); // put it in a collection
+ map53289.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map53289.get("keyB-53289"); // get it back out
+ bar = (String) map53289.get("keyA-53289"); // get safe value back out
+
+ String fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+ java.io.InputStream is = null;
+
+ try {
+ java.nio.file.Path path = java.nio.file.Paths.get(fileName);
+ is = java.nio.file.Files.newInputStream(path, java.nio.file.StandardOpenOption.READ);
+ byte[] b = new byte[1000];
+ int size = is.read(b);
+ response.getWriter()
+ .println(
+ "The beginning of file: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
+ + "' is:\n\n");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(new String(b, 0, size)));
+ is.close();
+ } catch (Exception e) {
+ System.out.println("Couldn't open InputStream on file: '" + fileName + "'");
+ response.getWriter()
+ .println(
+ "Problem getting InputStream: "
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(e.getMessage()));
+ } finally {
+ if (is != null) {
+ try {
+ is.close();
+ is = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00138.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00138.java
new file mode 100644
index 0000000000000000000000000000000000000000..4d7d81d7ca77ac345153b32be67f9436555887ab
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00138.java
@@ -0,0 +1,92 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/ldapi-00/BenchmarkTest00138")
+public class BenchmarkTest00138 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00138") != null) {
+ param = request.getHeader("BenchmarkTest00138");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
+ try {
+ response.setContentType("text/html;charset=UTF-8");
+ String base = "ou=users,ou=system";
+ javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
+ sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
+ String filter = "(&(objectclass=person))(|(uid=" + bar + ")(street={0}))";
+ Object[] filters = new Object[] {"The streetz 4 Ms bar"};
+
+ javax.naming.directory.DirContext ctx = ads.getDirContext();
+ javax.naming.directory.InitialDirContext idc =
+ (javax.naming.directory.InitialDirContext) ctx;
+ boolean found = false;
+ javax.naming.NamingEnumeration results =
+ idc.search(base, filter, filters, sc);
+ while (results.hasMore()) {
+ javax.naming.directory.SearchResult sr =
+ (javax.naming.directory.SearchResult) results.next();
+ javax.naming.directory.Attributes attrs = sr.getAttributes();
+
+ javax.naming.directory.Attribute attr = attrs.get("uid");
+ javax.naming.directory.Attribute attr2 = attrs.get("street");
+ if (attr != null) {
+ response.getWriter()
+ .println(
+ "LDAP query results:
"
+ + "Record found with name "
+ + attr.get()
+ + "
"
+ + "Address: "
+ + attr2.get()
+ + "
");
+ // System.out.println("record found " + attr.get());
+ found = true;
+ }
+ }
+ if (!found) {
+ response.getWriter()
+ .println(
+ "LDAP query results: nothing found for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
+ }
+ } catch (javax.naming.NamingException e) {
+ throw new ServletException(e);
+ } finally {
+ try {
+ ads.closeDirContext();
+ } catch (Exception e) {
+ throw new ServletException(e);
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00139.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00139.java
new file mode 100644
index 0000000000000000000000000000000000000000..6cd41ff3f200c5e6248319b36291ac8680ecfcd3
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00139.java
@@ -0,0 +1,108 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/ldapi-00/BenchmarkTest00139")
+public class BenchmarkTest00139 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00139") != null) {
+ param = request.getHeader("BenchmarkTest00139");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a48394 = param; // assign
+ StringBuilder b48394 = new StringBuilder(a48394); // stick in stringbuilder
+ b48394.append(" SafeStuff"); // append some safe content
+ b48394.replace(
+ b48394.length() - "Chars".length(),
+ b48394.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map48394 = new java.util.HashMap();
+ map48394.put("key48394", b48394.toString()); // put in a collection
+ String c48394 = (String) map48394.get("key48394"); // get it back out
+ String d48394 = c48394.substring(0, c48394.length() - 1); // extract most of it
+ String e48394 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d48394.getBytes()))); // B64 encode and decode it
+ String f48394 = e48394.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g48394 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g48394); // reflection
+
+ org.owasp.benchmark.helpers.LDAPManager ads = new org.owasp.benchmark.helpers.LDAPManager();
+ try {
+ response.setContentType("text/html;charset=UTF-8");
+ String base = "ou=users,ou=system";
+ javax.naming.directory.SearchControls sc = new javax.naming.directory.SearchControls();
+ sc.setSearchScope(javax.naming.directory.SearchControls.SUBTREE_SCOPE);
+ String filter = "(&(objectclass=person)(uid=" + bar + "))";
+
+ javax.naming.directory.DirContext ctx = ads.getDirContext();
+ javax.naming.directory.InitialDirContext idc =
+ (javax.naming.directory.InitialDirContext) ctx;
+ boolean found = false;
+ javax.naming.NamingEnumeration results =
+ idc.search(base, filter, sc);
+
+ while (results.hasMore()) {
+ javax.naming.directory.SearchResult sr =
+ (javax.naming.directory.SearchResult) results.next();
+ javax.naming.directory.Attributes attrs = sr.getAttributes();
+
+ javax.naming.directory.Attribute attr = attrs.get("uid");
+ javax.naming.directory.Attribute attr2 = attrs.get("street");
+ if (attr != null) {
+ response.getWriter()
+ .println(
+ "LDAP query results:
"
+ + "Record found with name "
+ + attr.get()
+ + "
"
+ + "Address: "
+ + attr2.get()
+ + "
");
+ // System.out.println("record found " + attr.get());
+ found = true;
+ }
+ }
+ if (!found) {
+ response.getWriter()
+ .println(
+ "LDAP query results: nothing found for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(filter));
+ }
+ } catch (javax.naming.NamingException e) {
+ throw new ServletException(e);
+ } finally {
+ try {
+ ads.closeDirContext();
+ } catch (Exception e) {
+ throw new ServletException(e);
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00140.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00140.java
new file mode 100644
index 0000000000000000000000000000000000000000..7329644a1924a94eed30e3431dfe181ecc469126
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00140.java
@@ -0,0 +1,94 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00140")
+public class BenchmarkTest00140 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00140") != null) {
+ param = request.getHeader("BenchmarkTest00140");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ double value = java.lang.Math.random();
+ String rememberMeKey = Double.toString(value).substring(2); // Trim off the 0. at the front.
+
+ String user = "Doug";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ response.getWriter().println("Weak Randomness Test java.lang.Math.random() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00141.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00141.java
new file mode 100644
index 0000000000000000000000000000000000000000..a919f47b96baec69074ea33487429ee210bcad12
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00141.java
@@ -0,0 +1,102 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00141")
+public class BenchmarkTest00141 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00141") != null) {
+ param = request.getHeader("BenchmarkTest00141");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ java.security.Provider[] provider = java.security.Security.getProviders();
+ java.security.MessageDigest md;
+
+ try {
+ if (provider.length > 1) {
+
+ md = java.security.MessageDigest.getInstance("SHA1", provider[0]);
+ } else {
+ md = java.security.MessageDigest.getInstance("SHA1", "SUN");
+ }
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00142.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00142.java
new file mode 100644
index 0000000000000000000000000000000000000000..393490116fe9c9c6f78a81303bcb588c24018889
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00142.java
@@ -0,0 +1,89 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00142")
+public class BenchmarkTest00142 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00142") != null) {
+ param = request.getHeader("BenchmarkTest00142");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ try {
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance("SHA-256");
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00143.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00143.java
new file mode 100644
index 0000000000000000000000000000000000000000..077da9435b338ca2beb10fe2a4fa04e974b8555e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00143.java
@@ -0,0 +1,107 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00143")
+public class BenchmarkTest00143 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00143") != null) {
+ param = request.getHeader("BenchmarkTest00143");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00144.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00144.java
new file mode 100644
index 0000000000000000000000000000000000000000..425d798d189f63ce298dc7e252cf0bfdf61853d4
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00144.java
@@ -0,0 +1,49 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00144")
+public class BenchmarkTest00144 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", "b"};
+ response.getWriter().format(java.util.Locale.US, bar, obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00145.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00145.java
new file mode 100644
index 0000000000000000000000000000000000000000..8a596035c5c6c8ad2c3a3b7e5abc877f975e3e0a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00145.java
@@ -0,0 +1,44 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00145")
+public class BenchmarkTest00145 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map17589 = new java.util.HashMap();
+ map17589.put("keyA-17589", "a-Value"); // put some stuff in the collection
+ map17589.put("keyB-17589", param); // put it in a collection
+ map17589.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map17589.get("keyB-17589"); // get it back out
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", "b"};
+ response.getWriter().format(java.util.Locale.US, bar, obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00146.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00146.java
new file mode 100644
index 0000000000000000000000000000000000000000..7315583969fb1a7710929efdfa266a55545e166e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00146.java
@@ -0,0 +1,43 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00146")
+public class BenchmarkTest00146 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = param;
+ if (param != null && param.length() > 1) {
+ StringBuilder sbxyz67327 = new StringBuilder(param);
+ bar = sbxyz67327.replace(param.length() - "Z".length(), param.length(), "Z").toString();
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", "b"};
+ response.getWriter().format(java.util.Locale.US, bar, obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00147.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00147.java
new file mode 100644
index 0000000000000000000000000000000000000000..19826807b710fa811315f8d5ef8bc658807315be
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00147.java
@@ -0,0 +1,49 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00147")
+public class BenchmarkTest00147 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", bar};
+ response.getWriter().format("Formatted like: %1$s and %2$s.", obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00148.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00148.java
new file mode 100644
index 0000000000000000000000000000000000000000..91bf62d0ab4fdad88c1860d0ef08011f37c098a2
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00148.java
@@ -0,0 +1,44 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00148")
+public class BenchmarkTest00148 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", bar};
+ response.getWriter().format("Formatted like: %1$s and %2$s.", obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00149.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00149.java
new file mode 100644
index 0000000000000000000000000000000000000000..13456790f943eca7993c97eca1720358444c7ea1
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00149.java
@@ -0,0 +1,40 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00149")
+public class BenchmarkTest00149 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ StringBuilder sbxyz19132 = new StringBuilder(param);
+ String bar = sbxyz19132.append("_SafeStuff").toString();
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", bar};
+ response.getWriter().printf(java.util.Locale.US, "Formatted like: %1$s and %2$s.", obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00150.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00150.java
new file mode 100644
index 0000000000000000000000000000000000000000..bd20305e2721de69b25b07f1cfed79736c3a42eb
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00150.java
@@ -0,0 +1,44 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00150")
+public class BenchmarkTest00150 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", bar};
+ response.getWriter().printf(java.util.Locale.US, "Formatted like: %1$s and %2$s.", obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00151.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00151.java
new file mode 100644
index 0000000000000000000000000000000000000000..9998cc0c8265f20514968844165609a662268d10
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00151.java
@@ -0,0 +1,49 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00151")
+public class BenchmarkTest00151 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ Object[] obj = {"a", "b"};
+ response.getWriter().printf(bar, obj);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00152.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00152.java
new file mode 100644
index 0000000000000000000000000000000000000000..de7083bf349e49c859f750d0d4a3dc78b328300f
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00152.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00152")
+public class BenchmarkTest00152 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ response.getWriter().println(bar.toCharArray());
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00153.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00153.java
new file mode 100644
index 0000000000000000000000000000000000000000..b29b01c7fbb4bb8315d5377d7680110296bf9d50
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00153.java
@@ -0,0 +1,43 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00153")
+public class BenchmarkTest00153 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map96050 = new java.util.HashMap();
+ map96050.put("keyA-96050", "a-Value"); // put some stuff in the collection
+ map96050.put("keyB-96050", param); // put it in a collection
+ map96050.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map96050.get("keyB-96050"); // get it back out
+
+ response.setHeader("X-XSS-Protection", "0");
+ response.getWriter().println(bar);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00154.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00154.java
new file mode 100644
index 0000000000000000000000000000000000000000..5f65dd3e66a4bf0502a9b53c84cd8b42de548ffb
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00154.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00154")
+public class BenchmarkTest00154 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ response.getWriter().println(bar);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00155.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00155.java
new file mode 100644
index 0000000000000000000000000000000000000000..4101f40a20fbe5be67d45470192452b3b2baaf1e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00155.java
@@ -0,0 +1,40 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00155")
+public class BenchmarkTest00155 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ response.setHeader("X-XSS-Protection", "0");
+ response.getWriter().println(bar);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00156.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00156.java
new file mode 100644
index 0000000000000000000000000000000000000000..401907f1e668b84764842e855559c6fcba1838f6
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00156.java
@@ -0,0 +1,48 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00156")
+public class BenchmarkTest00156 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ response.setHeader("X-XSS-Protection", "0");
+ response.getWriter().write(bar.toCharArray());
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00157.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00157.java
new file mode 100644
index 0000000000000000000000000000000000000000..a95f6d73df546cffea6308a1ad5ad5daa7346228
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00157.java
@@ -0,0 +1,43 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xss-00/BenchmarkTest00157")
+public class BenchmarkTest00157 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("Referer") != null) {
+ param = request.getHeader("Referer");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ response.setHeader("X-XSS-Protection", "0");
+ response.getWriter().write(bar);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00158.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00158.java
new file mode 100644
index 0000000000000000000000000000000000000000..805071003cd3f3de2b4fc351430cc818cde02a58
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00158.java
@@ -0,0 +1,63 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00158")
+public class BenchmarkTest00158 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00158") != null) {
+ param = request.getHeader("BenchmarkTest00158");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ java.util.List argList = new java.util.ArrayList();
+
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ argList.add("cmd.exe");
+ argList.add("/c");
+ } else {
+ argList.add("sh");
+ argList.add("-c");
+ }
+ argList.add("echo " + bar);
+
+ ProcessBuilder pb = new ProcessBuilder(argList);
+
+ try {
+ Process p = pb.start();
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println(
+ "Problem executing cmdi - java.lang.ProcessBuilder(java.util.List) Test Case");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00159.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00159.java
new file mode 100644
index 0000000000000000000000000000000000000000..66c221784fb8c0966a6927038132b78d60ca4067
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00159.java
@@ -0,0 +1,60 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00159")
+public class BenchmarkTest00159 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00159") != null) {
+ param = request.getHeader("BenchmarkTest00159");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ String a1 = "";
+ String a2 = "";
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ a1 = "cmd.exe";
+ a2 = "/c";
+ } else {
+ a1 = "sh";
+ a2 = "-c";
+ }
+ String[] args = {a1, a2, "echo " + bar};
+
+ ProcessBuilder pb = new ProcessBuilder(args);
+
+ try {
+ Process p = pb.start();
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println(
+ "Problem executing cmdi - java.lang.ProcessBuilder(java.lang.String[]) Test Case");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00160.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00160.java
new file mode 100644
index 0000000000000000000000000000000000000000..f6718ca283eb7390cf2587f6dd624f580bc4d6a1
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00160.java
@@ -0,0 +1,92 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00160")
+public class BenchmarkTest00160 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00160") != null) {
+ param = request.getHeader("BenchmarkTest00160");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ byte[] bytes = new byte[10];
+ new java.util.Random().nextBytes(bytes);
+ String rememberMeKey = org.owasp.esapi.ESAPI.encoder().encodeForBase64(bytes, true);
+
+ String user = "Byron";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextBytes() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00161.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00161.java
new file mode 100644
index 0000000000000000000000000000000000000000..b27dc5a30809703d5ddb8e047a87c65787d24a47
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00161.java
@@ -0,0 +1,90 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00161")
+public class BenchmarkTest00161 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00161") != null) {
+ param = request.getHeader("BenchmarkTest00161");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map91760 = new java.util.HashMap();
+ map91760.put("keyA-91760", "a_Value"); // put some stuff in the collection
+ map91760.put("keyB-91760", param); // put it in a collection
+ map91760.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map91760.get("keyB-91760"); // get it back out
+ bar = (String) map91760.get("keyA-91760"); // get safe value back out
+
+ double value = new java.util.Random().nextDouble();
+ String rememberMeKey = Double.toString(value).substring(2); // Trim off the 0. at the front.
+
+ String user = "Donna";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextDouble() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00162.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00162.java
new file mode 100644
index 0000000000000000000000000000000000000000..7b4a9d2ea10012f0a5022c4c3083c05acf467a20
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00162.java
@@ -0,0 +1,84 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00162")
+public class BenchmarkTest00162 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00162") != null) {
+ param = request.getHeader("BenchmarkTest00162");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = org.springframework.web.util.HtmlUtils.htmlEscape(param);
+
+ double stuff = new java.util.Random().nextGaussian();
+ String rememberMeKey = Double.toString(stuff).substring(2); // Trim off the 0. at the front.
+
+ String user = "Gayle";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter()
+ .println("Weak Randomness Test java.util.Random.nextGaussian() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00163.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00163.java
new file mode 100644
index 0000000000000000000000000000000000000000..16c36c612964a435b21751459c3c3f6ff445b110
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00163.java
@@ -0,0 +1,85 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00163")
+public class BenchmarkTest00163 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00163") != null) {
+ param = request.getHeader("BenchmarkTest00163");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ StringBuilder sbxyz89305 = new StringBuilder(param);
+ String bar = sbxyz89305.append("_SafeStuff").toString();
+
+ double stuff = new java.util.Random().nextGaussian();
+ String rememberMeKey = Double.toString(stuff).substring(2); // Trim off the 0. at the front.
+
+ String user = "Gayle";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter()
+ .println("Weak Randomness Test java.util.Random.nextGaussian() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00164.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00164.java
new file mode 100644
index 0000000000000000000000000000000000000000..870abc9de1ccdfd3ff60a56ba943db249472b86c
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00164.java
@@ -0,0 +1,88 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00164")
+public class BenchmarkTest00164 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00164") != null) {
+ param = request.getHeader("BenchmarkTest00164");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ int r = new java.util.Random().nextInt();
+ String rememberMeKey = Integer.toString(r);
+
+ String user = "Ingrid";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00165.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00165.java
new file mode 100644
index 0000000000000000000000000000000000000000..1ea26a2706b6577f99d1326611eb12c65c77fc7e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00165.java
@@ -0,0 +1,86 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00165")
+public class BenchmarkTest00165 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00165") != null) {
+ param = request.getHeader("BenchmarkTest00165");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = param;
+ if (param != null && param.length() > 1) {
+ bar = param.substring(0, param.length() - 1);
+ }
+
+ int r = new java.util.Random().nextInt();
+ String rememberMeKey = Integer.toString(r);
+
+ String user = "Ingrid";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00166.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00166.java
new file mode 100644
index 0000000000000000000000000000000000000000..b47d18a0edad328333beedd1236419eb93f7d2c5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00166.java
@@ -0,0 +1,84 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00166")
+public class BenchmarkTest00166 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00166") != null) {
+ param = request.getHeader("BenchmarkTest00166");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = param;
+
+ long l = new java.util.Random().nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "Logan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00167.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00167.java
new file mode 100644
index 0000000000000000000000000000000000000000..b2e9ddb00ab4da604b8ab829d745d6d2950fabd5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00167.java
@@ -0,0 +1,91 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00167")
+public class BenchmarkTest00167 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00167") != null) {
+ param = request.getHeader("BenchmarkTest00167");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ long l = new java.util.Random().nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "Logan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00168.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00168.java
new file mode 100644
index 0000000000000000000000000000000000000000..da7dc9017f75c39b350ed55870295aba4190d327
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00168.java
@@ -0,0 +1,89 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00168")
+public class BenchmarkTest00168 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00168") != null) {
+ param = request.getHeader("BenchmarkTest00168");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ long l = new java.util.Random().nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "Logan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00169.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00169.java
new file mode 100644
index 0000000000000000000000000000000000000000..d4f733f09d86e3c12a2f2f7aa6673c9bdda03ecd
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00169.java
@@ -0,0 +1,74 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/securecookie-00/BenchmarkTest00169")
+public class BenchmarkTest00169 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00169") != null) {
+ param = request.getHeader("BenchmarkTest00169");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ byte[] input = new byte[1000];
+ String str = "?";
+ Object inputParam = param;
+ if (inputParam instanceof String) str = ((String) inputParam);
+ if (inputParam instanceof java.io.InputStream) {
+ int i = ((java.io.InputStream) inputParam).read(input);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ str = new String(input, 0, i);
+ }
+ if ("".equals(str)) str = "No cookie value supplied";
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
+
+ cookie.setSecure(false);
+ cookie.setHttpOnly(true);
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ response.addCookie(cookie);
+
+ response.getWriter()
+ .println(
+ "Created cookie: 'SomeCookie': with value: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
+ + "' and secure flag set to: false");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00170.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00170.java
new file mode 100644
index 0000000000000000000000000000000000000000..855cb13e5210e659b18dc4e66afd40ff3e0e9a4a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00170.java
@@ -0,0 +1,85 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/securecookie-00/BenchmarkTest00170")
+public class BenchmarkTest00170 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00170") != null) {
+ param = request.getHeader("BenchmarkTest00170");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a9823 = param; // assign
+ StringBuilder b9823 = new StringBuilder(a9823); // stick in stringbuilder
+ b9823.append(" SafeStuff"); // append some safe content
+ b9823.replace(
+ b9823.length() - "Chars".length(),
+ b9823.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map9823 = new java.util.HashMap();
+ map9823.put("key9823", b9823.toString()); // put in a collection
+ String c9823 = (String) map9823.get("key9823"); // get it back out
+ String d9823 = c9823.substring(0, c9823.length() - 1); // extract most of it
+ String e9823 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d9823.getBytes()))); // B64 encode and decode it
+ String f9823 = e9823.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g9823 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g9823); // reflection
+
+ byte[] input = new byte[1000];
+ String str = "?";
+ Object inputParam = param;
+ if (inputParam instanceof String) str = ((String) inputParam);
+ if (inputParam instanceof java.io.InputStream) {
+ int i = ((java.io.InputStream) inputParam).read(input);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ str = new String(input, 0, i);
+ }
+ if ("".equals(str)) str = "No cookie value supplied";
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
+
+ cookie.setSecure(false);
+ cookie.setHttpOnly(true);
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ response.addCookie(cookie);
+
+ response.getWriter()
+ .println(
+ "Created cookie: 'SomeCookie': with value: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
+ + "' and secure flag set to: false");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00171.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00171.java
new file mode 100644
index 0000000000000000000000000000000000000000..715c3662ab60a33dcb5394a2c3b1faffdec477f8
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00171.java
@@ -0,0 +1,73 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00171")
+public class BenchmarkTest00171 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00171") != null) {
+ param = request.getHeader("BenchmarkTest00171");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map40534 = new java.util.HashMap();
+ map40534.put("keyA-40534", "a_Value"); // put some stuff in the collection
+ map40534.put("keyB-40534", param); // put it in a collection
+ map40534.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map40534.get("keyB-40534"); // get it back out
+ bar = (String) map40534.get("keyA-40534"); // get safe value back out
+
+ String cmd = "";
+ String a1 = "";
+ String a2 = "";
+ String[] args = null;
+ String osName = System.getProperty("os.name");
+
+ if (osName.indexOf("Windows") != -1) {
+ a1 = "cmd.exe";
+ a2 = "/c";
+ cmd = "echo ";
+ args = new String[] {a1, a2, cmd, bar};
+ } else {
+ a1 = "sh";
+ a2 = "-c";
+ cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("ls ");
+ args = new String[] {a1, a2, cmd + bar};
+ }
+
+ String[] argsEnv = {"foo=bar"};
+
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(args, argsEnv, new java.io.File(System.getProperty("user.dir")));
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00172.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00172.java
new file mode 100644
index 0000000000000000000000000000000000000000..def9bbaff86546913ea2ad3752e47f5ad1a5468d
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00172.java
@@ -0,0 +1,58 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00172")
+public class BenchmarkTest00172 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00172") != null) {
+ param = request.getHeader("BenchmarkTest00172");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map59408 = new java.util.HashMap();
+ map59408.put("keyA-59408", "a-Value"); // put some stuff in the collection
+ map59408.put("keyB-59408", param); // put it in a collection
+ map59408.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map59408.get("keyB-59408"); // get it back out
+
+ String cmd =
+ org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
+ this.getClass().getClassLoader());
+ String[] args = {cmd};
+ String[] argsEnv = {bar};
+
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(args, argsEnv, new java.io.File(System.getProperty("user.dir")));
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00173.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00173.java
new file mode 100644
index 0000000000000000000000000000000000000000..e4b6d12b161efc58a1d5deea787eb0fcad8f6634
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00173.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00173")
+public class BenchmarkTest00173 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00173") != null) {
+ param = request.getHeader("BenchmarkTest00173");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map68097 = new java.util.HashMap();
+ map68097.put("keyA-68097", "a-Value"); // put some stuff in the collection
+ map68097.put("keyB-68097", param); // put it in a collection
+ map68097.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map68097.get("keyB-68097"); // get it back out
+
+ String cmd =
+ org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
+ this.getClass().getClassLoader());
+
+ String[] argsEnv = {bar};
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(cmd, argsEnv);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00174.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00174.java
new file mode 100644
index 0000000000000000000000000000000000000000..7b132d86f1f68cdf148058cd9e7c69b3c27dcb21
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00174.java
@@ -0,0 +1,54 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00174")
+public class BenchmarkTest00174 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00174") != null) {
+ param = request.getHeader("BenchmarkTest00174");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ String cmd =
+ org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
+ this.getClass().getClassLoader());
+
+ String[] argsEnv = {bar};
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(cmd, argsEnv);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00175.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00175.java
new file mode 100644
index 0000000000000000000000000000000000000000..0806dfa14128b3a98709e03a35cf9485855ccf24
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00175.java
@@ -0,0 +1,58 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00175")
+public class BenchmarkTest00175 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00175") != null) {
+ param = request.getHeader("BenchmarkTest00175");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map50591 = new java.util.HashMap();
+ map50591.put("keyA-50591", "a_Value"); // put some stuff in the collection
+ map50591.put("keyB-50591", param); // put it in a collection
+ map50591.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map50591.get("keyB-50591"); // get it back out
+ bar = (String) map50591.get("keyA-50591"); // get safe value back out
+
+ String cmd =
+ org.owasp.benchmark.helpers.Utils.getInsecureOSCommandString(
+ this.getClass().getClassLoader());
+
+ String[] argsEnv = {bar};
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p = r.exec(cmd, argsEnv);
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00176.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00176.java
new file mode 100644
index 0000000000000000000000000000000000000000..e92034093f29c5bdaf8a130f4fa75073c624404b
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00176.java
@@ -0,0 +1,55 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00176")
+public class BenchmarkTest00176 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00176") != null) {
+ param = request.getHeader("BenchmarkTest00176");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = param;
+
+ String cmd = "";
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("echo");
+ }
+
+ String[] argsEnv = {"Foo=bar"};
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p =
+ r.exec(cmd + bar, argsEnv, new java.io.File(System.getProperty("user.dir")));
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00177.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00177.java
new file mode 100644
index 0000000000000000000000000000000000000000..f80d6e55f59d1d0baf403ccae76daaa9e49effa7
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00177.java
@@ -0,0 +1,60 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/cmdi-00/BenchmarkTest00177")
+public class BenchmarkTest00177 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00177") != null) {
+ param = request.getHeader("BenchmarkTest00177");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ String cmd = "";
+ String osName = System.getProperty("os.name");
+ if (osName.indexOf("Windows") != -1) {
+ cmd = org.owasp.benchmark.helpers.Utils.getOSCommandString("echo");
+ }
+
+ String[] argsEnv = {"Foo=bar"};
+ Runtime r = Runtime.getRuntime();
+
+ try {
+ Process p =
+ r.exec(cmd + bar, argsEnv, new java.io.File(System.getProperty("user.dir")));
+ org.owasp.benchmark.helpers.Utils.printOSCommandResults(p, response);
+ } catch (IOException e) {
+ System.out.println("Problem executing cmdi - TestCase");
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(e.getMessage()));
+ return;
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00178.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00178.java
new file mode 100644
index 0000000000000000000000000000000000000000..16f8673cfddfdd0d4ea97e370d8a86ba544b04d3
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00178.java
@@ -0,0 +1,101 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00178")
+public class BenchmarkTest00178 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00178") != null) {
+ param = request.getHeader("BenchmarkTest00178");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = org.springframework.web.util.HtmlUtils.htmlEscape(param);
+
+ try {
+ java.util.Random numGen = java.security.SecureRandom.getInstance("SHA1PRNG");
+
+ // Get 40 random bytes
+ byte[] randomBytes = new byte[40];
+ getNextNumber(numGen, randomBytes);
+
+ String rememberMeKey =
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(randomBytes, true);
+
+ String user = "SafeBystander";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextBytes() - TestCase");
+ throw new ServletException(e);
+ } finally {
+ response.getWriter()
+ .println(
+ "Randomness Test java.security.SecureRandom.nextBytes(byte[]) executed");
+ }
+ }
+
+ void getNextNumber(java.util.Random generator, byte[] barray) {
+ generator.nextBytes(barray);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00179.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00179.java
new file mode 100644
index 0000000000000000000000000000000000000000..2d791400aec685468d47c6872580b481c849dc6c
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00179.java
@@ -0,0 +1,92 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00179")
+public class BenchmarkTest00179 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00179") != null) {
+ param = request.getHeader("BenchmarkTest00179");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = org.apache.commons.lang.StringEscapeUtils.escapeHtml(param);
+
+ try {
+ double rand = java.security.SecureRandom.getInstance("SHA1PRNG").nextDouble();
+
+ String rememberMeKey =
+ Double.toString(rand).substring(2); // Trim off the 0. at the front.
+
+ String user = "SafeDonna";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextDouble() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextDouble() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00180.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00180.java
new file mode 100644
index 0000000000000000000000000000000000000000..0cb26ce3cab4f5a5958f087e12a53294cfcd40e6
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00180.java
@@ -0,0 +1,102 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00180")
+public class BenchmarkTest00180 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00180") != null) {
+ param = request.getHeader("BenchmarkTest00180");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ try {
+ java.util.Random numGen = java.security.SecureRandom.getInstance("SHA1PRNG");
+ double rand = getNextNumber(numGen);
+
+ String rememberMeKey =
+ Double.toString(rand).substring(2); // Trim off the 0. at the front.
+
+ String user = "SafeDonatella";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextDouble() - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextDouble() executed");
+ }
+
+ double getNextNumber(java.util.Random generator) {
+ return generator.nextDouble();
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00181.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00181.java
new file mode 100644
index 0000000000000000000000000000000000000000..4a6f53845e3458a46340212c2a84d435f6c3d73b
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00181.java
@@ -0,0 +1,92 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00181")
+public class BenchmarkTest00181 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00181") != null) {
+ param = request.getHeader("BenchmarkTest00181");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = org.springframework.web.util.HtmlUtils.htmlEscape(param);
+
+ try {
+ double rand = java.security.SecureRandom.getInstance("SHA1PRNG").nextDouble();
+
+ String rememberMeKey =
+ Double.toString(rand).substring(2); // Trim off the 0. at the front.
+
+ String user = "SafeDonna";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextDouble() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextDouble() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00182.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00182.java
new file mode 100644
index 0000000000000000000000000000000000000000..0252126ba7d4893e01e2eddfc85689d839340c1e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00182.java
@@ -0,0 +1,111 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00182")
+public class BenchmarkTest00182 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00182") != null) {
+ param = request.getHeader("BenchmarkTest00182");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a48649 = param; // assign
+ StringBuilder b48649 = new StringBuilder(a48649); // stick in stringbuilder
+ b48649.append(" SafeStuff"); // append some safe content
+ b48649.replace(
+ b48649.length() - "Chars".length(),
+ b48649.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map48649 = new java.util.HashMap();
+ map48649.put("key48649", b48649.toString()); // put in a collection
+ String c48649 = (String) map48649.get("key48649"); // get it back out
+ String d48649 = c48649.substring(0, c48649.length() - 1); // extract most of it
+ String e48649 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d48649.getBytes()))); // B64 encode and decode it
+ String f48649 = e48649.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g48649 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g48649); // reflection
+
+ try {
+ double stuff = java.security.SecureRandom.getInstance("SHA1PRNG").nextGaussian();
+ String rememberMeKey =
+ Double.toString(stuff).substring(2); // Trim off the 0. at the front.
+
+ String user = "SafeGayle";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextGaussian() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextGaussian() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00183.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00183.java
new file mode 100644
index 0000000000000000000000000000000000000000..358869d16b84c99f4711a880b40663c01a405eab
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00183.java
@@ -0,0 +1,109 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00183")
+public class BenchmarkTest00183 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00183") != null) {
+ param = request.getHeader("BenchmarkTest00183");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(1); // condition 'B', which is safe
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bob";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bob's your uncle";
+ break;
+ }
+
+ try {
+ double stuff = java.security.SecureRandom.getInstance("SHA1PRNG").nextGaussian();
+ String rememberMeKey =
+ Double.toString(stuff).substring(2); // Trim off the 0. at the front.
+
+ String user = "SafeGayle";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextGaussian() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextGaussian() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00184.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00184.java
new file mode 100644
index 0000000000000000000000000000000000000000..0ece598c0b456cd8f4dbfebe0f1f7b323c29a22a
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00184.java
@@ -0,0 +1,94 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00184")
+public class BenchmarkTest00184 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00184") != null) {
+ param = request.getHeader("BenchmarkTest00184");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map46743 = new java.util.HashMap();
+ map46743.put("keyA-46743", "a-Value"); // put some stuff in the collection
+ map46743.put("keyB-46743", param); // put it in a collection
+ map46743.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map46743.get("keyB-46743"); // get it back out
+
+ try {
+ int randNumber = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "SafeInga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextInt(int) - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00185.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00185.java
new file mode 100644
index 0000000000000000000000000000000000000000..82ddcdf72ae49931a97aab9361022f243ffc40ee
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00185.java
@@ -0,0 +1,95 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00185")
+public class BenchmarkTest00185 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00185") != null) {
+ param = request.getHeader("BenchmarkTest00185");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "safe!";
+ java.util.HashMap map60659 = new java.util.HashMap();
+ map60659.put("keyA-60659", "a_Value"); // put some stuff in the collection
+ map60659.put("keyB-60659", param); // put it in a collection
+ map60659.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map60659.get("keyB-60659"); // get it back out
+ bar = (String) map60659.get("keyA-60659"); // get safe value back out
+
+ try {
+ int randNumber = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "SafeInga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextInt(int) - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00186.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00186.java
new file mode 100644
index 0000000000000000000000000000000000000000..ef412f2b977a3376d7119cc4fbc607d105bc3f3b
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00186.java
@@ -0,0 +1,110 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00186")
+public class BenchmarkTest00186 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00186") != null) {
+ param = request.getHeader("BenchmarkTest00186");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a18509 = param; // assign
+ StringBuilder b18509 = new StringBuilder(a18509); // stick in stringbuilder
+ b18509.append(" SafeStuff"); // append some safe content
+ b18509.replace(
+ b18509.length() - "Chars".length(),
+ b18509.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map18509 = new java.util.HashMap();
+ map18509.put("key18509", b18509.toString()); // put in a collection
+ String c18509 = (String) map18509.get("key18509"); // get it back out
+ String d18509 = c18509.substring(0, c18509.length() - 1); // extract most of it
+ String e18509 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d18509.getBytes()))); // B64 encode and decode it
+ String f18509 = e18509.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g18509 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g18509); // reflection
+
+ try {
+ int randNumber = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "SafeInga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextInt(int) - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00187.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00187.java
new file mode 100644
index 0000000000000000000000000000000000000000..dc1e60ef647feb941ca5f950e12dc3da8b17d4da
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00187.java
@@ -0,0 +1,99 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00187")
+public class BenchmarkTest00187 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00187") != null) {
+ param = request.getHeader("BenchmarkTest00187");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ try {
+ int r = java.security.SecureRandom.getInstance("SHA1PRNG").nextInt();
+ String rememberMeKey = Integer.toString(r);
+
+ String user = "SafeIngrid";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextInt() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextInt() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00188.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00188.java
new file mode 100644
index 0000000000000000000000000000000000000000..07918eca43e54080ad3aa2335d0c1b3546f203ee
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00188.java
@@ -0,0 +1,94 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00188")
+public class BenchmarkTest00188 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00188") != null) {
+ param = request.getHeader("BenchmarkTest00188");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ try {
+ long l = java.security.SecureRandom.getInstance("SHA1PRNG").nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "SafeLogan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextLong() - TestCase");
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println("Weak Randomness Test java.security.SecureRandom.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00189.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00189.java
new file mode 100644
index 0000000000000000000000000000000000000000..9d1482398687b6f9aa0dd1fbe9de0e0a5a4e413e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00189.java
@@ -0,0 +1,65 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/trustbound-00/BenchmarkTest00189")
+public class BenchmarkTest00189 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00189") != null) {
+ param = request.getHeader("BenchmarkTest00189");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a14330 = param; // assign
+ StringBuilder b14330 = new StringBuilder(a14330); // stick in stringbuilder
+ b14330.append(" SafeStuff"); // append some safe content
+ b14330.replace(
+ b14330.length() - "Chars".length(),
+ b14330.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map14330 = new java.util.HashMap();
+ map14330.put("key14330", b14330.toString()); // put in a collection
+ String c14330 = (String) map14330.get("key14330"); // get it back out
+ String d14330 = c14330.substring(0, c14330.length() - 1); // extract most of it
+ String e14330 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d14330.getBytes()))); // B64 encode and decode it
+ String f14330 = e14330.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g14330 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g14330); // reflection
+
+ // javax.servlet.http.HttpSession.setAttribute(java.lang.String,java.lang.Object^)
+ request.getSession().setAttribute("userid", bar);
+
+ response.getWriter()
+ .println(
+ "Item: 'userid' with value: '"
+ + org.owasp.benchmark.helpers.Utils.encodeForHTML(bar)
+ + "' saved in session.");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00190.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00190.java
new file mode 100644
index 0000000000000000000000000000000000000000..ba0cbe1165d435383a766efcd8ecb6abf6cf9b8d
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00190.java
@@ -0,0 +1,64 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00190")
+public class BenchmarkTest00190 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00190") != null) {
+ param = request.getHeader("BenchmarkTest00190");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ String sql = "{call " + bar + "}";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.CallableStatement statement =
+ connection.prepareCall(
+ sql,
+ java.sql.ResultSet.TYPE_FORWARD_ONLY,
+ java.sql.ResultSet.CONCUR_READ_ONLY);
+ java.sql.ResultSet rs = statement.executeQuery();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(rs, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00191.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00191.java
new file mode 100644
index 0000000000000000000000000000000000000000..eb38738318d5a5c274bc3c368a360de13e6ac3bd
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00191.java
@@ -0,0 +1,73 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00191")
+public class BenchmarkTest00191 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00191") != null) {
+ param = request.getHeader("BenchmarkTest00191");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(1); // condition 'B', which is safe
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bob";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bob's your uncle";
+ break;
+ }
+
+ String sql = "{call " + bar + "}";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.CallableStatement statement =
+ connection.prepareCall(
+ sql,
+ java.sql.ResultSet.TYPE_FORWARD_ONLY,
+ java.sql.ResultSet.CONCUR_READ_ONLY);
+ java.sql.ResultSet rs = statement.executeQuery();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(rs, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00192.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00192.java
new file mode 100644
index 0000000000000000000000000000000000000000..bd77a94d1a19b7278b29a2c13bac26bb57dd3309
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00192.java
@@ -0,0 +1,70 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00192")
+public class BenchmarkTest00192 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00192") != null) {
+ param = request.getHeader("BenchmarkTest00192");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.PreparedStatement statement = connection.prepareStatement(sql);
+ statement.setString(1, "foo");
+ statement.execute();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00193.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00193.java
new file mode 100644
index 0000000000000000000000000000000000000000..a83998895af5d71df42be83fe62866de4526d43c
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00193.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00193")
+public class BenchmarkTest00193 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00193") != null) {
+ param = request.getHeader("BenchmarkTest00193");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ String sql = "SELECT * from USERS where USERNAME=? and PASSWORD='" + bar + "'";
+
+ try {
+ java.sql.Connection connection =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlConnection();
+ java.sql.PreparedStatement statement =
+ connection.prepareStatement(sql, new String[] {"Column1", "Column2"});
+ statement.setString(1, "foo");
+ statement.execute();
+ org.owasp.benchmark.helpers.DatabaseHelper.printResults(statement, sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00194.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00194.java
new file mode 100644
index 0000000000000000000000000000000000000000..76c26d2cf868dd9a8124f53ade4ebea6dbe797dc
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00194.java
@@ -0,0 +1,60 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00194")
+public class BenchmarkTest00194 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00194") != null) {
+ param = request.getHeader("BenchmarkTest00194");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ try {
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.batchUpdate(sql);
+ response.getWriter()
+ .println(
+ "No results can be displayed for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
+ + "
"
+ + " because the Spring batchUpdate method doesn't return results.");
+ // System.out.println("no results for query: " + sql + " because the Spring batchUpdate
+ // method doesn't return results.");
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00195.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00195.java
new file mode 100644
index 0000000000000000000000000000000000000000..0a3804cf7a021280031f3867d6320200b4dfd61e
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00195.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00195")
+public class BenchmarkTest00195 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00195") != null) {
+ param = request.getHeader("BenchmarkTest00195");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ try {
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.execute(sql);
+ response.getWriter()
+ .println(
+ "No results can be displayed for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
+ + "
"
+ + " because the Spring execute method doesn't return results.");
+
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00196.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00196.java
new file mode 100644
index 0000000000000000000000000000000000000000..570ee0e0a8e3288090b94675ba009b0756964aa0
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00196.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00196")
+public class BenchmarkTest00196 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00196") != null) {
+ param = request.getHeader("BenchmarkTest00196");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ try {
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.execute(sql);
+ response.getWriter()
+ .println(
+ "No results can be displayed for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
+ + "
"
+ + " because the Spring execute method doesn't return results.");
+
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00197.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00197.java
new file mode 100644
index 0000000000000000000000000000000000000000..b5232dea421371005fc6cce02b627dbd5b387e48
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00197.java
@@ -0,0 +1,81 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00197")
+public class BenchmarkTest00197 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00197") != null) {
+ param = request.getHeader("BenchmarkTest00197");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+ try {
+ java.util.List results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.query(
+ sql,
+ new org.springframework.jdbc.core.RowMapper() {
+ @Override
+ public String mapRow(java.sql.ResultSet rs, int rowNum)
+ throws java.sql.SQLException {
+ try {
+ return rs.getString("USERNAME");
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper
+ .hideSQLErrors) {
+ return "Error processing query.";
+ } else throw e;
+ }
+ }
+ });
+ response.getWriter().println("Your results are: ");
+
+ for (String s : results) {
+ response.getWriter()
+ .println(org.owasp.esapi.ESAPI.encoder().encodeForHTML(s) + "
");
+ }
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00198.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00198.java
new file mode 100644
index 0000000000000000000000000000000000000000..ad471f756e2e14b397428720564a2a7585c82d58
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00198.java
@@ -0,0 +1,57 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00198")
+public class BenchmarkTest00198 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00198") != null) {
+ param = request.getHeader("BenchmarkTest00198");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ String sql = "SELECT userid from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+ try {
+ // int results =
+ // org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForInt(sql);
+ Integer results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForObject(
+ sql, Integer.class);
+ response.getWriter().println("Your results are: " + results);
+ // System.out.println("Your results are: " + results);
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00199.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00199.java
new file mode 100644
index 0000000000000000000000000000000000000000..47b0c59111fecadf62b73392c009c8e39c581282
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00199.java
@@ -0,0 +1,60 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00199")
+public class BenchmarkTest00199 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00199") != null) {
+ param = request.getHeader("BenchmarkTest00199");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ String sql = "SELECT userid from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+ try {
+ // int results =
+ // org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForInt(sql);
+ Integer results =
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.queryForObject(
+ sql, Integer.class);
+ response.getWriter().println("Your results are: " + results);
+ // System.out.println("Your results are: " + results);
+ } catch (org.springframework.dao.EmptyResultDataAccessException e) {
+ response.getWriter()
+ .println(
+ "No results returned for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql));
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00200.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00200.java
new file mode 100644
index 0000000000000000000000000000000000000000..8f61e042f434ff92ece6273ce03b68d8f3489d64
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00200.java
@@ -0,0 +1,61 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00200")
+public class BenchmarkTest00200 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00200") != null) {
+ param = request.getHeader("BenchmarkTest00200");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ try {
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.batchUpdate(sql);
+ response.getWriter()
+ .println(
+ "No results can be displayed for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
+ + "
"
+ + " because the Spring batchUpdate method doesn't return results.");
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00201.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00201.java
new file mode 100644
index 0000000000000000000000000000000000000000..51b81e6498ff15c2032d65c4c5cb9cdd9e1dde10
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00201.java
@@ -0,0 +1,72 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00201")
+public class BenchmarkTest00201 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00201") != null) {
+ param = request.getHeader("BenchmarkTest00201");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a60073 = param; // assign
+ StringBuilder b60073 = new StringBuilder(a60073); // stick in stringbuilder
+ b60073.append(" SafeStuff"); // append some safe content
+ b60073.replace(
+ b60073.length() - "Chars".length(),
+ b60073.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map60073 = new java.util.HashMap();
+ map60073.put("key60073", b60073.toString()); // put in a collection
+ String c60073 = (String) map60073.get("key60073"); // get it back out
+ String d60073 = c60073.substring(0, c60073.length() - 1); // extract most of it
+ String e60073 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d60073.getBytes()))); // B64 encode and decode it
+ String f60073 = e60073.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g60073 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g60073); // reflection
+
+ try {
+ String sql = "SELECT * from USERS where USERNAME='foo' and PASSWORD='" + bar + "'";
+
+ org.owasp.benchmark.helpers.DatabaseHelper.JDBCtemplate.batchUpdate(sql);
+ response.getWriter()
+ .println(
+ "No results can be displayed for query: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(sql)
+ + "
"
+ + " because the Spring batchUpdate method doesn't return results.");
+ } catch (org.springframework.dao.DataAccessException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00202.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00202.java
new file mode 100644
index 0000000000000000000000000000000000000000..65f116ecd2ad81487a4159f2882923b04908e243
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00202.java
@@ -0,0 +1,70 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00202")
+public class BenchmarkTest00202 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00202") != null) {
+ param = request.getHeader("BenchmarkTest00202");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a15497 = param; // assign
+ StringBuilder b15497 = new StringBuilder(a15497); // stick in stringbuilder
+ b15497.append(" SafeStuff"); // append some safe content
+ b15497.replace(
+ b15497.length() - "Chars".length(),
+ b15497.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map15497 = new java.util.HashMap();
+ map15497.put("key15497", b15497.toString()); // put in a collection
+ String c15497 = (String) map15497.get("key15497"); // get it back out
+ String d15497 = c15497.substring(0, c15497.length() - 1); // extract most of it
+ String e15497 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d15497.getBytes()))); // B64 encode and decode it
+ String f15497 = e15497.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g15497 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g15497); // reflection
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql, new int[] {1, 2});
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00203.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00203.java
new file mode 100644
index 0000000000000000000000000000000000000000..defb15e49b936a035954974fc50d0a5f277137fd
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00203.java
@@ -0,0 +1,54 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00203")
+public class BenchmarkTest00203 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00203") != null) {
+ param = request.getHeader("BenchmarkTest00203");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql, new String[] {"USERNAME", "PASSWORD"});
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00204.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00204.java
new file mode 100644
index 0000000000000000000000000000000000000000..1c1881429ac3dba78b7d9193469854e0ca2e99bc
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00204.java
@@ -0,0 +1,51 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00204")
+public class BenchmarkTest00204 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00204") != null) {
+ param = request.getHeader("BenchmarkTest00204");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql, new String[] {"USERNAME", "PASSWORD"});
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00205.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00205.java
new file mode 100644
index 0000000000000000000000000000000000000000..9ddcec7f6a405513e721da25491d3a4b31547c9d
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00205.java
@@ -0,0 +1,59 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00205")
+public class BenchmarkTest00205 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00205") != null) {
+ param = request.getHeader("BenchmarkTest00205");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql, new String[] {"USERNAME", "PASSWORD"});
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00206.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00206.java
new file mode 100644
index 0000000000000000000000000000000000000000..0fd19bd01b0b96c02ed14bae48da40b2933e25a0
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00206.java
@@ -0,0 +1,70 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/sqli-00/BenchmarkTest00206")
+public class BenchmarkTest00206 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00206") != null) {
+ param = request.getHeader("BenchmarkTest00206");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ // Chain a bunch of propagators in sequence
+ String a13396 = param; // assign
+ StringBuilder b13396 = new StringBuilder(a13396); // stick in stringbuilder
+ b13396.append(" SafeStuff"); // append some safe content
+ b13396.replace(
+ b13396.length() - "Chars".length(),
+ b13396.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map13396 = new java.util.HashMap();
+ map13396.put("key13396", b13396.toString()); // put in a collection
+ String c13396 = (String) map13396.get("key13396"); // get it back out
+ String d13396 = c13396.substring(0, c13396.length() - 1); // extract most of it
+ String e13396 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d13396.getBytes()))); // B64 encode and decode it
+ String f13396 = e13396.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g13396 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g13396); // reflection
+
+ String sql = "INSERT INTO users (username, password) VALUES ('foo','" + bar + "')";
+
+ try {
+ java.sql.Statement statement =
+ org.owasp.benchmark.helpers.DatabaseHelper.getSqlStatement();
+ int count = statement.executeUpdate(sql, new String[] {"USERNAME", "PASSWORD"});
+ org.owasp.benchmark.helpers.DatabaseHelper.outputUpdateComplete(sql, response);
+ } catch (java.sql.SQLException e) {
+ if (org.owasp.benchmark.helpers.DatabaseHelper.hideSQLErrors) {
+ response.getWriter().println("Error processing request.");
+ return;
+ } else throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00207.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00207.java
new file mode 100644
index 0000000000000000000000000000000000000000..f5b7da3acea30da102bde22e91b7ca80ecf38be9
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00207.java
@@ -0,0 +1,72 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/xpathi-00/BenchmarkTest00207")
+public class BenchmarkTest00207 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ if (request.getHeader("BenchmarkTest00207") != null) {
+ param = request.getHeader("BenchmarkTest00207");
+ }
+
+ // URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
+ param = java.net.URLDecoder.decode(param, "UTF-8");
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ try {
+ java.io.FileInputStream file =
+ new java.io.FileInputStream(
+ org.owasp.benchmark.helpers.Utils.getFileFromClasspath(
+ "employees.xml", this.getClass().getClassLoader()));
+ javax.xml.parsers.DocumentBuilderFactory builderFactory =
+ javax.xml.parsers.DocumentBuilderFactory.newInstance();
+ // Prevent XXE
+ builderFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
+ javax.xml.parsers.DocumentBuilder builder = builderFactory.newDocumentBuilder();
+ org.w3c.dom.Document xmlDocument = builder.parse(file);
+ javax.xml.xpath.XPathFactory xpf = javax.xml.xpath.XPathFactory.newInstance();
+ javax.xml.xpath.XPath xp = xpf.newXPath();
+
+ String expression = "/Employees/Employee[@emplid='" + bar + "']";
+ String result = xp.evaluate(expression, xmlDocument);
+
+ response.getWriter().println("Your query results are: " + result + "
");
+
+ } catch (javax.xml.xpath.XPathExpressionException
+ | javax.xml.parsers.ParserConfigurationException
+ | org.xml.sax.SAXException e) {
+ response.getWriter()
+ .println(
+ "Error parsing XPath input: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(bar)
+ + "'");
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00208.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00208.java
new file mode 100644
index 0000000000000000000000000000000000000000..8bf6bd4a601cba799e79a422e3b8056c2a965f74
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00208.java
@@ -0,0 +1,154 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00208")
+public class BenchmarkTest00208 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding", "SunJCE");
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.NoSuchPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00209.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00209.java
new file mode 100644
index 0000000000000000000000000000000000000000..64f2ffa31388d8d22de7939d05c745f12a93c033
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00209.java
@@ -0,0 +1,106 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00209")
+public class BenchmarkTest00209 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ StringBuilder sbxyz43235 = new StringBuilder(param);
+ String bar = sbxyz43235.append("_SafeStuff").toString();
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+
+ try {
+ javax.crypto.Cipher c = org.owasp.benchmark.helpers.Utils.getCipher();
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (javax.crypto.IllegalBlockSizeException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ } catch (javax.crypto.BadPaddingException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ response.getWriter()
+ .println(
+ "Crypto Test javax.crypto.Cipher.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00210.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00210.java
new file mode 100644
index 0000000000000000000000000000000000000000..d6001ae739a4b8f466e975c21c97e2dadc1777be
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00210.java
@@ -0,0 +1,118 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00210")
+public class BenchmarkTest00210 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = param;
+ if (param != null && param.length() > 1) {
+ bar = param.substring(0, param.length() - 1);
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ java.security.SecureRandom random = new java.security.SecureRandom();
+ byte[] iv = random.generateSeed(8); // DES requires 8 byte keys
+
+ try {
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance("DES/CBC/PKCS5Padding");
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("DES").generateKey();
+ java.security.spec.AlgorithmParameterSpec paramSpec =
+ new javax.crypto.spec.IvParameterSpec(iv);
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key, paramSpec);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException
+ | java.security.InvalidAlgorithmParameterException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00211.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00211.java
new file mode 100644
index 0000000000000000000000000000000000000000..292817243814395c4247e42b49f3147c0a561f92
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00211.java
@@ -0,0 +1,117 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00211")
+public class BenchmarkTest00211 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "alsosafe";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(1); // get the last 'safe' value
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance(
+ "AES/CCM/NoPadding", java.security.Security.getProvider("BC"));
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00212.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00212.java
new file mode 100644
index 0000000000000000000000000000000000000000..b987455304874ce8ce6a59d37694a6e67f680da1
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00212.java
@@ -0,0 +1,112 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00212")
+public class BenchmarkTest00212 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+
+ try {
+ javax.crypto.Cipher c =
+ javax.crypto.Cipher.getInstance(
+ "AES/CCM/NoPadding", java.security.Security.getProvider("BC"));
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String,java.security.Provider) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00213.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00213.java
new file mode 100644
index 0000000000000000000000000000000000000000..ea2c74d27ab2dbcef3f4963ef67718e7cfd923e7
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00213.java
@@ -0,0 +1,126 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00213")
+public class BenchmarkTest00213 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ // java.security.SecureRandom random = new java.security.SecureRandom();
+ // byte[] iv = random.generateSeed(16);
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg2", "AES/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00214.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00214.java
new file mode 100644
index 0000000000000000000000000000000000000000..c2ea3e8554a1096269b8b0461b65a5b9c2cfbcd9
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00214.java
@@ -0,0 +1,116 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/crypto-00/BenchmarkTest00214")
+public class BenchmarkTest00214 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = param;
+
+ // Code based on example from:
+ // http://examples.javacodegeeks.com/core-java/crypto/encrypt-decrypt-file-stream-with-des/
+ // 8-byte initialization vector
+ // byte[] iv = {
+ // (byte)0xB2, (byte)0x12, (byte)0xD5, (byte)0xB2,
+ // (byte)0x44, (byte)0x21, (byte)0xC3, (byte)0xC3033
+ // };
+ // java.security.SecureRandom random = new java.security.SecureRandom();
+ // byte[] iv = random.generateSeed(16);
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("cryptoAlg2", "AES/ECB/PKCS5Padding");
+ javax.crypto.Cipher c = javax.crypto.Cipher.getInstance(algorithm);
+
+ // Prepare the cipher to encrypt
+ javax.crypto.SecretKey key = javax.crypto.KeyGenerator.getInstance("AES").generateKey();
+ c.init(javax.crypto.Cipher.ENCRYPT_MODE, key);
+
+ // encrypt and store the results
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ byte[] result = c.doFinal(input);
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "secret_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' encrypted and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException
+ | javax.crypto.NoSuchPaddingException
+ | javax.crypto.IllegalBlockSizeException
+ | javax.crypto.BadPaddingException
+ | java.security.InvalidKeyException e) {
+ response.getWriter()
+ .println(
+ "Problem executing crypto - javax.crypto.Cipher.getInstance(java.lang.String) Test Case");
+ e.printStackTrace(response.getWriter());
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00215.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00215.java
new file mode 100644
index 0000000000000000000000000000000000000000..4c6e0d05981673c6aed51cabadf209e3604eda06
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00215.java
@@ -0,0 +1,63 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00215")
+public class BenchmarkTest00215 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = param;
+
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR), bar);
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00216.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00216.java
new file mode 100644
index 0000000000000000000000000000000000000000..3279eb460ca429a7a20570b49e6e73750de56b35
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00216.java
@@ -0,0 +1,67 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00216")
+public class BenchmarkTest00216 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ java.io.File fileTarget =
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR, bar);
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00217.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00217.java
new file mode 100644
index 0000000000000000000000000000000000000000..eb64a2048de5a5d73ca546c6629bc6a9c5150ce0
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00217.java
@@ -0,0 +1,82 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00217")
+public class BenchmarkTest00217 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ // Chain a bunch of propagators in sequence
+ String a26348 = param; // assign
+ StringBuilder b26348 = new StringBuilder(a26348); // stick in stringbuilder
+ b26348.append(" SafeStuff"); // append some safe content
+ b26348.replace(
+ b26348.length() - "Chars".length(),
+ b26348.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map26348 = new java.util.HashMap();
+ map26348.put("key26348", b26348.toString()); // put in a collection
+ String c26348 = (String) map26348.get("key26348"); // get it back out
+ String d26348 = c26348.substring(0, c26348.length() - 1); // extract most of it
+ String e26348 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d26348.getBytes()))); // B64 encode and decode it
+ String f26348 = e26348.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g26348 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g26348); // reflection
+
+ java.io.File fileTarget = new java.io.File(bar, "/Test.txt");
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00218.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00218.java
new file mode 100644
index 0000000000000000000000000000000000000000..166551d399c8063c413afbfb6dce1f7ec34889e5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00218.java
@@ -0,0 +1,103 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00218")
+public class BenchmarkTest00218 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ // FILE URIs are tricky because they are different between Mac and Windows because of lack
+ // of standardization.
+ // Mac requires an extra slash for some reason.
+ String startURIslashes = "";
+ if (System.getProperty("os.name").indexOf("Windows") != -1)
+ if (System.getProperty("os.name").indexOf("Windows") != -1) startURIslashes = "/";
+ else startURIslashes = "//";
+
+ try {
+ java.net.URI fileURI =
+ new java.net.URI(
+ "file",
+ null,
+ startURIslashes
+ + org.owasp.benchmark.helpers.Utils.TESTFILES_DIR
+ .replace('\\', java.io.File.separatorChar)
+ .replace(' ', '_')
+ + bar,
+ null,
+ null);
+ java.io.File fileTarget = new java.io.File(fileURI);
+ response.getWriter()
+ .println(
+ "Access to file: '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(fileTarget.toString())
+ + "' created.");
+ if (fileTarget.exists()) {
+ response.getWriter().println(" And file already exists.");
+ } else {
+ response.getWriter().println(" But file doesn't exist yet.");
+ }
+ } catch (java.net.URISyntaxException e) {
+ throw new ServletException(e);
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00219.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00219.java
new file mode 100644
index 0000000000000000000000000000000000000000..ad95228bcf438a2e8656fb251b30e37ffd9303d5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00219.java
@@ -0,0 +1,89 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00219")
+public class BenchmarkTest00219 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple ? condition that assigns param to bar on false condition
+ int num = 106;
+
+ bar = (7 * 42) - num > 200 ? "This should never happen" : param;
+
+ String fileName = null;
+ java.io.FileInputStream fis = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+ fis = new java.io.FileInputStream(new java.io.File(fileName));
+ byte[] b = new byte[1000];
+ int size = fis.read(b);
+ response.getWriter()
+ .println(
+ "The beginning of file: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName)
+ + "' is:\n\n"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(b, 0, size)));
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileInputStream on file: '" + fileName + "'");
+ response.getWriter()
+ .println(
+ "Problem getting FileInputStream: "
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(e.getMessage()));
+ } finally {
+ if (fis != null) {
+ try {
+ fis.close();
+ fis = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00220.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00220.java
new file mode 100644
index 0000000000000000000000000000000000000000..c4c585b92a39c334fb65221446eefc09f5915eb9
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00220.java
@@ -0,0 +1,92 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00220")
+public class BenchmarkTest00220 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ // Chain a bunch of propagators in sequence
+ String a25969 = param; // assign
+ StringBuilder b25969 = new StringBuilder(a25969); // stick in stringbuilder
+ b25969.append(" SafeStuff"); // append some safe content
+ b25969.replace(
+ b25969.length() - "Chars".length(),
+ b25969.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map25969 = new java.util.HashMap();
+ map25969.put("key25969", b25969.toString()); // put in a collection
+ String c25969 = (String) map25969.get("key25969"); // get it back out
+ String d25969 = c25969.substring(0, c25969.length() - 1); // extract most of it
+ String e25969 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d25969.getBytes()))); // B64 encode and decode it
+ String f25969 = e25969.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g25969 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g25969); // reflection
+
+ String fileName = null;
+ java.io.FileOutputStream fos = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+
+ fos = new java.io.FileOutputStream(fileName, false);
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
+ } finally {
+ if (fos != null) {
+ try {
+ fos.close();
+ fos = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00221.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00221.java
new file mode 100644
index 0000000000000000000000000000000000000000..61876cfc33834a10d35fa1ad552bab3dbaa4d282
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00221.java
@@ -0,0 +1,76 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00221")
+public class BenchmarkTest00221 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple ? condition that assigns constant to bar on true condition
+ int num = 106;
+
+ bar = (7 * 18) + num > 200 ? "This_should_always_happen" : param;
+
+ String fileName = null;
+ java.io.FileOutputStream fos = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+
+ fos = new java.io.FileOutputStream(fileName, false);
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
+ } finally {
+ if (fos != null) {
+ try {
+ fos.close();
+ fos = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00222.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00222.java
new file mode 100644
index 0000000000000000000000000000000000000000..0348fb7eeb99729c73b0deb470f4a935624be9d3
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00222.java
@@ -0,0 +1,90 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/pathtraver-00/BenchmarkTest00222")
+public class BenchmarkTest00222 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ String fileName = null;
+ java.io.FileOutputStream fos = null;
+
+ try {
+ fileName = org.owasp.benchmark.helpers.Utils.TESTFILES_DIR + bar;
+
+ fos = new java.io.FileOutputStream(fileName);
+ response.getWriter()
+ .println(
+ "Now ready to write to file: "
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(fileName));
+
+ } catch (Exception e) {
+ System.out.println("Couldn't open FileOutputStream on file: '" + fileName + "'");
+ // System.out.println("File exception caught and swallowed: " + e.getMessage());
+ } finally {
+ if (fos != null) {
+ try {
+ fos.close();
+ fos = null;
+ } catch (Exception e) {
+ // we tried...
+ }
+ }
+ }
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00223.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00223.java
new file mode 100644
index 0000000000000000000000000000000000000000..287f1774edad69aac6447c4dbbb10b891ec11842
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00223.java
@@ -0,0 +1,112 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00223")
+public class BenchmarkTest00223 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "safe!";
+ java.util.HashMap map13848 = new java.util.HashMap();
+ map13848.put("keyA-13848", "a-Value"); // put some stuff in the collection
+ map13848.put("keyB-13848", param); // put it in a collection
+ map13848.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map13848.get("keyB-13848"); // get it back out
+
+ java.security.Provider[] provider = java.security.Security.getProviders();
+ java.security.MessageDigest md;
+
+ try {
+ if (provider.length > 1) {
+
+ md = java.security.MessageDigest.getInstance("SHA1", provider[0]);
+ } else {
+ md = java.security.MessageDigest.getInstance("SHA1", "SUN");
+ }
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00224.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00224.java
new file mode 100644
index 0000000000000000000000000000000000000000..6decf4feec322a78b52fb2bf92c800647a885415
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00224.java
@@ -0,0 +1,107 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00224")
+public class BenchmarkTest00224 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = param;
+
+ java.security.Provider[] provider = java.security.Security.getProviders();
+ java.security.MessageDigest md;
+
+ try {
+ if (provider.length > 1) {
+
+ md = java.security.MessageDigest.getInstance("sha-384", provider[0]);
+ } else {
+ md = java.security.MessageDigest.getInstance("sha-384", "SUN");
+ }
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.security.Provider) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00225.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00225.java
new file mode 100644
index 0000000000000000000000000000000000000000..5febeb7fc4f0452a323e76fc2e8db12491b1e0e7
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00225.java
@@ -0,0 +1,105 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00225")
+public class BenchmarkTest00225 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ try {
+ java.security.MessageDigest md =
+ java.security.MessageDigest.getInstance("SHA-512", "SUN");
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.lang.String)");
+ throw new ServletException(e);
+ } catch (java.security.NoSuchProviderException e) {
+ System.out.println(
+ "Problem executing hash - TestCase java.security.MessageDigest.getInstance(java.lang.String,java.lang.String)");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String,java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00226.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00226.java
new file mode 100644
index 0000000000000000000000000000000000000000..60f1b7541486d20613ac74e9ff2949644c704a62
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00226.java
@@ -0,0 +1,104 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00226")
+public class BenchmarkTest00226 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "safe!";
+ java.util.HashMap map56895 = new java.util.HashMap();
+ map56895.put("keyA-56895", "a_Value"); // put some stuff in the collection
+ map56895.put("keyB-56895", param); // put it in a collection
+ map56895.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map56895.get("keyB-56895"); // get it back out
+ bar = (String) map56895.get("keyA-56895"); // get safe value back out
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00227.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00227.java
new file mode 100644
index 0000000000000000000000000000000000000000..178009311a2625e25e4e64312b7d584c8f8e5880
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00227.java
@@ -0,0 +1,119 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00227")
+public class BenchmarkTest00227 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ // Chain a bunch of propagators in sequence
+ String a15913 = param; // assign
+ StringBuilder b15913 = new StringBuilder(a15913); // stick in stringbuilder
+ b15913.append(" SafeStuff"); // append some safe content
+ b15913.replace(
+ b15913.length() - "Chars".length(),
+ b15913.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map15913 = new java.util.HashMap();
+ map15913.put("key15913", b15913.toString()); // put in a collection
+ String c15913 = (String) map15913.get("key15913"); // get it back out
+ String d15913 = c15913.substring(0, c15913.length() - 1); // extract most of it
+ String e15913 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d15913.getBytes()))); // B64 encode and decode it
+ String f15913 = e15913.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String g15913 = "barbarians_at_the_gate"; // This is static so this whole flow is 'safe'
+ String bar = thing.doSomething(g15913); // reflection
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg1", "SHA512");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00228.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00228.java
new file mode 100644
index 0000000000000000000000000000000000000000..e82da5b977e7d51874fe4828b5348c99a428c0c5
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00228.java
@@ -0,0 +1,108 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00228")
+public class BenchmarkTest00228 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg2", "SHA5");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00229.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00229.java
new file mode 100644
index 0000000000000000000000000000000000000000..84dc9c74bb4b26685b00e3ef78a1acf651ccea12
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00229.java
@@ -0,0 +1,98 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/hash-00/BenchmarkTest00229")
+public class BenchmarkTest00229 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = org.owasp.esapi.ESAPI.encoder().encodeForHTML(param);
+
+ try {
+ java.util.Properties benchmarkprops = new java.util.Properties();
+ benchmarkprops.load(
+ this.getClass().getClassLoader().getResourceAsStream("benchmark.properties"));
+ String algorithm = benchmarkprops.getProperty("hashAlg2", "SHA5");
+ java.security.MessageDigest md = java.security.MessageDigest.getInstance(algorithm);
+ byte[] input = {(byte) '?'};
+ Object inputParam = bar;
+ if (inputParam instanceof String) input = ((String) inputParam).getBytes();
+ if (inputParam instanceof java.io.InputStream) {
+ byte[] strInput = new byte[1000];
+ int i = ((java.io.InputStream) inputParam).read(strInput);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ input = java.util.Arrays.copyOf(strInput, i);
+ }
+ md.update(input);
+
+ byte[] result = md.digest();
+ java.io.File fileTarget =
+ new java.io.File(
+ new java.io.File(org.owasp.benchmark.helpers.Utils.TESTFILES_DIR),
+ "passwordFile.txt");
+ java.io.FileWriter fw =
+ new java.io.FileWriter(fileTarget, true); // the true will append the new data
+ fw.write(
+ "hash_value="
+ + org.owasp.esapi.ESAPI.encoder().encodeForBase64(result, true)
+ + "\n");
+ fw.close();
+ response.getWriter()
+ .println(
+ "Sensitive value '"
+ + org.owasp
+ .esapi
+ .ESAPI
+ .encoder()
+ .encodeForHTML(new String(input))
+ + "' hashed and stored
");
+
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing hash - TestCase");
+ throw new ServletException(e);
+ }
+
+ response.getWriter()
+ .println(
+ "Hash Test java.security.MessageDigest.getInstance(java.lang.String) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00230.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00230.java
new file mode 100644
index 0000000000000000000000000000000000000000..ae0a1d60bf172d8a537b41e7f45bd88950c7f22d
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00230.java
@@ -0,0 +1,98 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00230")
+public class BenchmarkTest00230 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = param;
+ if (param != null && param.length() > 1) {
+ bar = param.substring(0, param.length() - 1);
+ }
+
+ byte[] bytes = new byte[10];
+ new java.util.Random().nextBytes(bytes);
+ String rememberMeKey = org.owasp.esapi.ESAPI.encoder().encodeForBase64(bytes, true);
+
+ String user = "Byron";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setDomain(new java.net.URL(request.getRequestURL().toString()).getHost());
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextBytes() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00231.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00231.java
new file mode 100644
index 0000000000000000000000000000000000000000..b8f7a9bd101154602643e4372b31ffe8767bcd7d
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00231.java
@@ -0,0 +1,99 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00231")
+public class BenchmarkTest00231 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "safe!";
+ java.util.HashMap map59585 = new java.util.HashMap();
+ map59585.put("keyA-59585", "a-Value"); // put some stuff in the collection
+ map59585.put("keyB-59585", param); // put it in a collection
+ map59585.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map59585.get("keyB-59585"); // get it back out
+
+ double stuff = new java.util.Random().nextGaussian();
+ String rememberMeKey = Double.toString(stuff).substring(2); // Trim off the 0. at the front.
+
+ String user = "Gayle";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter()
+ .println("Weak Randomness Test java.util.Random.nextGaussian() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00232.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00232.java
new file mode 100644
index 0000000000000000000000000000000000000000..62e619a885b483f5e6e24e89662673f63518fc6f
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00232.java
@@ -0,0 +1,100 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00232")
+public class BenchmarkTest00232 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "safe!";
+ java.util.HashMap map84140 = new java.util.HashMap();
+ map84140.put("keyA-84140", "a_Value"); // put some stuff in the collection
+ map84140.put("keyB-84140", param); // put it in a collection
+ map84140.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map84140.get("keyB-84140"); // get it back out
+ bar = (String) map84140.get("keyA-84140"); // get safe value back out
+
+ double stuff = new java.util.Random().nextGaussian();
+ String rememberMeKey = Double.toString(stuff).substring(2); // Trim off the 0. at the front.
+
+ String user = "Gayle";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter()
+ .println("Weak Randomness Test java.util.Random.nextGaussian() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00233.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00233.java
new file mode 100644
index 0000000000000000000000000000000000000000..44a6e48ec0c89b7c9d82c8ab2fe2d78fa81c6d89
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00233.java
@@ -0,0 +1,95 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00233")
+public class BenchmarkTest00233 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ int randNumber = new java.util.Random().nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "Inga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00234.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00234.java
new file mode 100644
index 0000000000000000000000000000000000000000..7b42f3bb81d2d0a67e0452cbd027468dd5f019dd
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00234.java
@@ -0,0 +1,99 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00234")
+public class BenchmarkTest00234 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "safe!";
+ java.util.HashMap map35995 = new java.util.HashMap();
+ map35995.put("keyA-35995", "a_Value"); // put some stuff in the collection
+ map35995.put("keyB-35995", param); // put it in a collection
+ map35995.put("keyC", "another_Value"); // put some stuff in the collection
+ bar = (String) map35995.get("keyB-35995"); // get it back out
+ bar = (String) map35995.get("keyA-35995"); // get safe value back out
+
+ int randNumber = new java.util.Random().nextInt(99);
+ String rememberMeKey = Integer.toString(randNumber);
+
+ String user = "Inga";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt(int) executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00235.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00235.java
new file mode 100644
index 0000000000000000000000000000000000000000..25f0f6f5230b3152aae71eaa207205900315c259
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00235.java
@@ -0,0 +1,95 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00235")
+public class BenchmarkTest00235 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ int r = new java.util.Random().nextInt();
+ String rememberMeKey = Integer.toString(r);
+
+ String user = "Ingrid";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00236.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00236.java
new file mode 100644
index 0000000000000000000000000000000000000000..af6b1f95d224f245b961d11d26cda35ea2b82464
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00236.java
@@ -0,0 +1,98 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00236")
+public class BenchmarkTest00236 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ int r = new java.util.Random().nextInt();
+ String rememberMeKey = Integer.toString(r);
+
+ String user = "Ingrid";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00237.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00237.java
new file mode 100644
index 0000000000000000000000000000000000000000..64fc0aaf37abb58faf34d2f5ad2a6a9baea05d90
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00237.java
@@ -0,0 +1,112 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00237")
+public class BenchmarkTest00237 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+ String guess = "ABC";
+ char switchTarget = guess.charAt(2);
+
+ // Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
+ switch (switchTarget) {
+ case 'A':
+ bar = param;
+ break;
+ case 'B':
+ bar = "bobs_your_uncle";
+ break;
+ case 'C':
+ case 'D':
+ bar = param;
+ break;
+ default:
+ bar = "bobs_your_uncle";
+ break;
+ }
+
+ int r = new java.util.Random().nextInt();
+ String rememberMeKey = Integer.toString(r);
+
+ String user = "Ingrid";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextInt() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00238.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00238.java
new file mode 100644
index 0000000000000000000000000000000000000000..2d58662599ff8f014bf3678656ff134aea9c47b7
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00238.java
@@ -0,0 +1,101 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00238")
+public class BenchmarkTest00238 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "";
+ if (param != null) {
+ bar =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ param.getBytes())));
+ }
+
+ long l = new java.util.Random().nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "Logan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00239.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00239.java
new file mode 100644
index 0000000000000000000000000000000000000000..35123718e1f7600c02bd19fe624afa0da37c7f41
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00239.java
@@ -0,0 +1,114 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00239")
+public class BenchmarkTest00239 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ // Chain a bunch of propagators in sequence
+ String a22450 = param; // assign
+ StringBuilder b22450 = new StringBuilder(a22450); // stick in stringbuilder
+ b22450.append(" SafeStuff"); // append some safe content
+ b22450.replace(
+ b22450.length() - "Chars".length(),
+ b22450.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map22450 = new java.util.HashMap();
+ map22450.put("key22450", b22450.toString()); // put in a collection
+ String c22450 = (String) map22450.get("key22450"); // get it back out
+ String d22450 = c22450.substring(0, c22450.length() - 1); // extract most of it
+ String e22450 =
+ new String(
+ org.apache.commons.codec.binary.Base64.decodeBase64(
+ org.apache.commons.codec.binary.Base64.encodeBase64(
+ d22450.getBytes()))); // B64 encode and decode it
+ String f22450 = e22450.split(" ")[0]; // split it on a space
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(f22450); // reflection
+
+ long l = new java.util.Random().nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "Logan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00240.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00240.java
new file mode 100644
index 0000000000000000000000000000000000000000..881e0dce5a9ee34c0130cd09037f1356063dfe8d
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00240.java
@@ -0,0 +1,96 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00240")
+public class BenchmarkTest00240 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ org.owasp.benchmark.helpers.ThingInterface thing =
+ org.owasp.benchmark.helpers.ThingFactory.createThing();
+ String bar = thing.doSomething(param);
+
+ long l = new java.util.Random().nextLong();
+ String rememberMeKey = Long.toString(l);
+
+ String user = "Logan";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue().equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+
+ response.getWriter().println("Weak Randomness Test java.util.Random.nextLong() executed");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00241.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00241.java
new file mode 100644
index 0000000000000000000000000000000000000000..2b09e5ac71984caf7a90e180762a4094411a8c6f
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00241.java
@@ -0,0 +1,79 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/securecookie-00/BenchmarkTest00241")
+public class BenchmarkTest00241 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple if statement that assigns constant to bar on true condition
+ int num = 86;
+ if ((7 * 42) - num > 200) bar = "This_should_always_happen";
+ else bar = param;
+
+ byte[] input = new byte[1000];
+ String str = "?";
+ Object inputParam = param;
+ if (inputParam instanceof String) str = ((String) inputParam);
+ if (inputParam instanceof java.io.InputStream) {
+ int i = ((java.io.InputStream) inputParam).read(input);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ str = new String(input, 0, i);
+ }
+ if ("".equals(str)) str = "No cookie value supplied";
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
+
+ cookie.setSecure(false);
+ cookie.setHttpOnly(true);
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ response.addCookie(cookie);
+
+ response.getWriter()
+ .println(
+ "Created cookie: 'SomeCookie': with value: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
+ + "' and secure flag set to: false");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00242.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00242.java
new file mode 100644
index 0000000000000000000000000000000000000000..fc2bcc5ae6973edd4d2ba1a7777a48a053c3002c
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00242.java
@@ -0,0 +1,84 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/securecookie-00/BenchmarkTest00242")
+public class BenchmarkTest00242 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "";
+ if (param != null) {
+ java.util.List valuesList = new java.util.ArrayList();
+ valuesList.add("safe");
+ valuesList.add(param);
+ valuesList.add("moresafe");
+
+ valuesList.remove(0); // remove the 1st safe value
+
+ bar = valuesList.get(0); // get the param value
+ }
+
+ byte[] input = new byte[1000];
+ String str = "?";
+ Object inputParam = param;
+ if (inputParam instanceof String) str = ((String) inputParam);
+ if (inputParam instanceof java.io.InputStream) {
+ int i = ((java.io.InputStream) inputParam).read(input);
+ if (i == -1) {
+ response.getWriter()
+ .println(
+ "This input source requires a POST, not a GET. Incompatible UI for the InputStream source.");
+ return;
+ }
+ str = new String(input, 0, i);
+ }
+ if ("".equals(str)) str = "No cookie value supplied";
+ javax.servlet.http.Cookie cookie = new javax.servlet.http.Cookie("SomeCookie", str);
+
+ cookie.setSecure(true);
+ cookie.setHttpOnly(true);
+ cookie.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ response.addCookie(cookie);
+
+ response.getWriter()
+ .println(
+ "Created cookie: 'SomeCookie': with value: '"
+ + org.owasp.esapi.ESAPI.encoder().encodeForHTML(str)
+ + "' and secure flag set to: true");
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00243.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00243.java
new file mode 100644
index 0000000000000000000000000000000000000000..1c1dcc327fcf86647b2349d793cbde5f15f62c75
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00243.java
@@ -0,0 +1,116 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00243")
+public class BenchmarkTest00243 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar = "safe!";
+ java.util.HashMap map86025 = new java.util.HashMap();
+ map86025.put("keyA-86025", "a-Value"); // put some stuff in the collection
+ map86025.put("keyB-86025", param); // put it in a collection
+ map86025.put("keyC", "another-Value"); // put some stuff in the collection
+ bar = (String) map86025.get("keyB-86025"); // get it back out
+
+ try {
+ java.util.Random numGen = java.security.SecureRandom.getInstance("SHA1PRNG");
+
+ // Get 40 random bytes
+ byte[] randomBytes = new byte[40];
+ getNextNumber(numGen, randomBytes);
+
+ String rememberMeKey =
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(randomBytes, true);
+
+ String user = "SafeBystander";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextBytes() - TestCase");
+ throw new ServletException(e);
+ } finally {
+ response.getWriter()
+ .println(
+ "Randomness Test java.security.SecureRandom.nextBytes(byte[]) executed");
+ }
+ }
+
+ void getNextNumber(java.util.Random generator, byte[] barray) {
+ generator.nextBytes(barray);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00244.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00244.java
new file mode 100644
index 0000000000000000000000000000000000000000..3b817a07677f191be5fc751f78fb9bfbf4bde209
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00244.java
@@ -0,0 +1,116 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00244")
+public class BenchmarkTest00244 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ String bar;
+
+ // Simple if statement that assigns param to bar on true condition
+ int num = 196;
+ if ((500 / 42) + num > 200) bar = param;
+ else bar = "This should never happen";
+
+ try {
+ java.util.Random numGen = java.security.SecureRandom.getInstance("SHA1PRNG");
+
+ // Get 40 random bytes
+ byte[] randomBytes = new byte[40];
+ getNextNumber(numGen, randomBytes);
+
+ String rememberMeKey =
+ org.owasp.esapi.ESAPI.encoder().encodeForBase64(randomBytes, true);
+
+ String user = "SafeBystander";
+ String fullClassName = this.getClass().getName();
+ String testCaseNumber =
+ fullClassName.substring(
+ fullClassName.lastIndexOf('.') + 1 + "BenchmarkTest".length());
+ user += testCaseNumber;
+
+ String cookieName = "rememberMe" + testCaseNumber;
+
+ boolean foundUser = false;
+ javax.servlet.http.Cookie[] cookies = request.getCookies();
+ if (cookies != null) {
+ for (int i = 0; !foundUser && i < cookies.length; i++) {
+ javax.servlet.http.Cookie cookie = cookies[i];
+ if (cookieName.equals(cookie.getName())) {
+ if (cookie.getValue()
+ .equals(request.getSession().getAttribute(cookieName))) {
+ foundUser = true;
+ }
+ }
+ }
+ }
+
+ if (foundUser) {
+ response.getWriter().println("Welcome back: " + user + "
");
+ } else {
+ javax.servlet.http.Cookie rememberMe =
+ new javax.servlet.http.Cookie(cookieName, rememberMeKey);
+ rememberMe.setSecure(true);
+ rememberMe.setHttpOnly(true);
+ rememberMe.setPath(request.getRequestURI()); // i.e., set path to JUST this servlet
+ // e.g., /benchmark/sql-01/BenchmarkTest01001
+ request.getSession().setAttribute(cookieName, rememberMeKey);
+ response.addCookie(rememberMe);
+ response.getWriter()
+ .println(
+ user
+ + " has been remembered with cookie: "
+ + rememberMe.getName()
+ + " whose value is: "
+ + rememberMe.getValue()
+ + "
");
+ }
+ } catch (java.security.NoSuchAlgorithmException e) {
+ System.out.println("Problem executing SecureRandom.nextBytes() - TestCase");
+ throw new ServletException(e);
+ } finally {
+ response.getWriter()
+ .println(
+ "Randomness Test java.security.SecureRandom.nextBytes(byte[]) executed");
+ }
+ }
+
+ void getNextNumber(java.util.Random generator, byte[] barray) {
+ generator.nextBytes(barray);
+ }
+}
diff --git a/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00245.java b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00245.java
new file mode 100644
index 0000000000000000000000000000000000000000..99d991aa43a7e69740307fdea59beb8964e2e6d0
--- /dev/null
+++ b/OWASP DATASET CLEANED/cleaned_Test_Cases/BenchmarkTest00245.java
@@ -0,0 +1,128 @@
+
+import java.io.IOException;
+import javax.servlet.ServletException;
+import javax.servlet.annotation.WebServlet;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+@WebServlet(value = "/weakrand-00/BenchmarkTest00245")
+public class BenchmarkTest00245 extends HttpServlet {
+
+ private static final long serialVersionUID = 1L;
+
+ @Override
+ public void doGet(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ doPost(request, response);
+ }
+
+ @Override
+ public void doPost(HttpServletRequest request, HttpServletResponse response)
+ throws ServletException, IOException {
+ response.setContentType("text/html;charset=UTF-8");
+
+ String param = "";
+ java.util.Enumeration names = request.getHeaderNames();
+ while (names.hasMoreElements()) {
+ String name = (String) names.nextElement();
+
+ if (org.owasp.benchmark.helpers.Utils.commonHeaders.contains(name)) {
+ continue; // If standard header, move on to next one
+ }
+
+ java.util.Enumeration values = request.getHeaders(name);
+ if (values != null && values.hasMoreElements()) {
+ param = name; // Grabs the name of the first non-standard header as the parameter
+ // value
+ break;
+ }
+ }
+ // Note: We don't URL decode header names because people don't normally do that
+
+ // Chain a bunch of propagators in sequence
+ String a73565 = param; // assign
+ StringBuilder b73565 = new StringBuilder(a73565); // stick in stringbuilder
+ b73565.append(" SafeStuff"); // append some safe content
+ b73565.replace(
+ b73565.length() - "Chars".length(),
+ b73565.length(),
+ "Chars"); // replace some of the end content
+ java.util.HashMap map73565 = new java.util.HashMap