From c001a67b95d005151b542c72f5a2d6dcd3f2f705 Mon Sep 17 00:00:00 2001
From: "wirth.marcel"
Date: Mon, 14 Apr 2008 13:28:25 +0000
Subject: [PATCH] Minor Bugfixes
git-svn-id: http://webgoat.googlecode.com/svn/trunk/webgoat@338 4033779f-a91e-0410-96ef-6bf7bf53c507
---
.../webgoat/lessons/SQLInjection/SQLInjection.java | 1 -
.../lesson_solutions/ClientSideFiltering.html | 6 +++---
.../lesson_solutions/ClientSideValidation.html | 7 ++++---
.../WebContent/lesson_solutions/InsecureLogin.html | 2 +-
.../Lab Bypass Business Layer Access Control.html | 4 ++--
.../Lab Bypass Data Layer Access Control.html | 6 +++---
.../lesson_solutions/Lab XSS/Lab Stored XSS.html | 4 ++--
.../WebContent/lesson_solutions/MultiLevelLogin1.html | 8 ++++----
.../WebContent/lesson_solutions/MultiLevelLogin2.html | 2 +-
.../WebContent/lesson_solutions/SessionFixation.html | 10 +++++-----
.../lesson_solutions/SqlNumericInjection.html | 8 ++++----
11 files changed, 29 insertions(+), 29 deletions(-)
diff --git a/main/project/JavaSource/org/owasp/webgoat/lessons/SQLInjection/SQLInjection.java b/main/project/JavaSource/org/owasp/webgoat/lessons/SQLInjection/SQLInjection.java
index ff5dcca1d..3e35123ac 100644
--- a/main/project/JavaSource/org/owasp/webgoat/lessons/SQLInjection/SQLInjection.java
+++ b/main/project/JavaSource/org/owasp/webgoat/lessons/SQLInjection/SQLInjection.java
@@ -265,7 +265,6 @@ public class SQLInjection extends GoatHillsFinancial
}
public String getLessonSolutionFileName(WebSession s) {
- System.out.println("SOLUTION!!!");
String solutionFileName = null;
String stage = getStage(s);
solutionFileName = "/lesson_solutions/Lab SQL Injection/Lab " + stage + ".html";
diff --git a/main/project/WebContent/lesson_solutions/ClientSideFiltering.html b/main/project/WebContent/lesson_solutions/ClientSideFiltering.html
index b8d320d97..cd3cde05c 100644
--- a/main/project/WebContent/lesson_solutions/ClientSideFiltering.html
+++ b/main/project/WebContent/lesson_solutions/ClientSideFiltering.html
@@ -35,10 +35,10 @@ First use any person from the list and see what you get. After doing this you
can search for a specific person in Firebug. Make sure you find the hidden table with
the information, including the salary and so on. In the same table you will find
Neville.
-
-
+
+
Inspect HTML on Firebug
-
+
Now write the salary into the text edit box and submit your answer!
diff --git a/main/project/WebContent/lesson_solutions/ClientSideValidation.html b/main/project/WebContent/lesson_solutions/ClientSideValidation.html
index 6d0e354ad..5885088a4 100644
--- a/main/project/WebContent/lesson_solutions/ClientSideValidation.html
+++ b/main/project/WebContent/lesson_solutions/ClientSideValidation.html
@@ -38,10 +38,11 @@ Now enter a character in the coupon code field. The Javascript gets executed
but stops at the breakpoint. On the right side you see the parameters
and there values. Now use the step over symbol or F10. Now you can read
the clear text of decrypted:
-
+
-Figure 1 Firebug in action
-
+
+Figure 1 Firebug in action
+
Now that you know the coupon name enter it in the coupon field, purchase something
and you are done.
diff --git a/main/project/WebContent/lesson_solutions/InsecureLogin.html b/main/project/WebContent/lesson_solutions/InsecureLogin.html
index 94521d640..513495659 100644
--- a/main/project/WebContent/lesson_solutions/InsecureLogin.html
+++ b/main/project/WebContent/lesson_solutions/InsecureLogin.html
@@ -33,7 +33,7 @@ to the Tomcat Setup in the Introduction section.
is free: Wireshark. Make sure
you are capturing on the right interface. Click on
the submit button ans stop the capturing. Now analyze the captured data.
-
+
Figure 1: Sniffed Traffic
diff --git a/main/project/WebContent/lesson_solutions/Lab Access Control/Lab Bypass Business Layer Access Control.html b/main/project/WebContent/lesson_solutions/Lab Access Control/Lab Bypass Business Layer Access Control.html
index 10af41c8e..eed12859d 100644
--- a/main/project/WebContent/lesson_solutions/Lab Access Control/Lab Bypass Business Layer Access Control.html
+++ b/main/project/WebContent/lesson_solutions/Lab Access Control/Lab Bypass Business Layer Access Control.html
@@ -35,9 +35,9 @@ deletes employees. Of course you could just guess
it because it has a really logical name.
But we will look it up. So your first step is to log in as John with john as
password. Use WebScarab to intercept the delete request.
-
+
-
+
As you can see the delete action is called DeleteProfile.
Now log in as Tom. Click in the list on his name and make sure WebScarab
will intercept the next request. Click on a button, for example the
diff --git a/main/project/WebContent/lesson_solutions/Lab Access Control/Lab Bypass Data Layer Access Control.html b/main/project/WebContent/lesson_solutions/Lab Access Control/Lab Bypass Data Layer Access Control.html
index 90426e4f8..737824523 100644
--- a/main/project/WebContent/lesson_solutions/Lab Access Control/Lab Bypass Data Layer Access Control.html
+++ b/main/project/WebContent/lesson_solutions/Lab Access Control/Lab Bypass Data Layer Access Control.html
@@ -37,10 +37,10 @@ of another employee!
Log in as Tom with tom as password. Click on Tom's name in the list and make sure
-webscarab will intercept the next request. Change the employee_id for example to 101.
-
+webscarab will intercept the next request. Change the employee_id for example to 101.
+
-
+