Adjust lesson template (#704)
* Remove method `getId()` from all lessons as it defaults to the class name * remove clean up endpoint * remove unused class `RequestParameter` * remove unused class `PluginLoadingFailure` * Move `CourseConfiguration` to lesson package * Add more content around the lesson template lesson and make it visible as a lesson in WebGoat * Remove explicit invocation `trackProgress()` inside WebGoat framework so assignments only need to return an `AttackResult` * Put original solution back as well for SQL string injection * review comments * Add
This commit is contained in:
committed by
René Zubcevic
parent
f40b6ffd31
commit
5dd6b31905
@ -38,8 +38,4 @@ public class VulnerableComponents extends Lesson {
|
||||
return "vulnerable-components.title";
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getId() {
|
||||
return "VulnerableComponents";
|
||||
}
|
||||
}
|
||||
|
@ -66,12 +66,12 @@ public class VulnerableComponentsLesson extends AssignmentEndpoint {
|
||||
try {
|
||||
// System.out.println("Payload:" + payload);
|
||||
Contact expl = (Contact) xstream.fromXML(payload);
|
||||
return trackProgress(success().feedback("vulnerable-components.fromXML").feedbackArgs(expl.toString()).build());
|
||||
return success(this).feedback("vulnerable-components.fromXML").feedbackArgs(expl.toString()).build();
|
||||
} catch (com.thoughtworks.xstream.converters.ConversionException ex) {
|
||||
if (ex.getMessage().contains("Integer")) {
|
||||
return trackProgress(success().feedback("vulnerable-components.success").build());
|
||||
return success(this).feedback("vulnerable-components.success").build();
|
||||
}
|
||||
return trackProgress(failed().feedback("vulnerable-components.close").build());
|
||||
return failed(this).feedback("vulnerable-components.close").build();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user