Make report working again
This commit is contained in:
@ -56,7 +56,7 @@ public class ClientSideFiltering extends NewLesson {
|
||||
|
||||
@Override
|
||||
public String getTitle() {
|
||||
return "Client side filtering";
|
||||
return "client.side.filtering.title";
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -1,3 +1,4 @@
|
||||
client.side.filtering.title=Client side filtering
|
||||
ClientSideFilteringSelectUser=Select user:
|
||||
ClientSideFilteringUserID=User ID
|
||||
ClientSideFilteringFirstName=First Name
|
||||
|
@ -60,7 +60,7 @@ public class CrossSiteScripting extends NewLesson {
|
||||
|
||||
@Override
|
||||
public String getTitle() {
|
||||
return "Cross Site Scripting";
|
||||
return "xss.title";
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -1,4 +1,5 @@
|
||||
# XSS success, failure messages and hints
|
||||
xss.title=Cross Site Scripting
|
||||
xss-reflected-5a-success=well done, but alerts aren't very impressive are they? Please continue.
|
||||
xss-reflected-5a-failure=Try again. We do want to see this specific javascript (in case you are trying to do something more fancy)
|
||||
xss-reflected-5b-success=Correct ... because <ul><li>The script was not triggered by the URL/QueryString</li><li>Even if you use the attack URL in a new tab, it won't execute (becuase of response type). Try it if you like.</li></ul>
|
||||
|
@ -53,7 +53,7 @@ public class SqlInjectionAdvanced extends NewLesson {
|
||||
|
||||
@Override
|
||||
public String getTitle() {
|
||||
return "SQL Injection (advanced)";
|
||||
return "sql.advanced.title";
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -60,7 +60,7 @@ public class SqlInjection extends NewLesson {
|
||||
|
||||
@Override
|
||||
public String getTitle() {
|
||||
return "SQL Injection";
|
||||
return "sql.injection.title";
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -53,7 +53,7 @@ public class SqlInjectionMitigations extends NewLesson {
|
||||
|
||||
@Override
|
||||
public String getTitle() {
|
||||
return "SQL Injection (mitigations)";
|
||||
return "sql.mitigation.title";
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -1,6 +1,12 @@
|
||||
#StringSqlInjection.java
|
||||
StringSqlInjectionSecondStage=Now that you have successfully performed an SQL injection, try the same type of attack on a parameterized query. Restart the lesson if you wish to return to the injectable query.
|
||||
EnterLastName=Enter your last name:
|
||||
|
||||
sql.injection.title=SQL Injection
|
||||
sql.mitigation.title=SQL Injection (mitigation)
|
||||
sql.advanced.title=SQL Injection (advanced)
|
||||
|
||||
|
||||
NoResultsMatched=No results matched. Try Again.
|
||||
SqlStringInjectionHint1=The application is taking your input and inserting it at the end of a pre-formed SQL command.
|
||||
SqlStringInjectionHint2=This is the code for the query being built and issued by WebGoat:<br><br> "SELECT * FROM user_data WHERE last_name = "accountName"
|
||||
|
@ -58,7 +58,7 @@ public class XXE extends NewLesson {
|
||||
|
||||
@Override
|
||||
public String getTitle() {
|
||||
return "XXE";
|
||||
return "xxe.title";
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -22,6 +22,7 @@
|
||||
# projects.
|
||||
# <p>
|
||||
#
|
||||
xxe.title=XXE
|
||||
xxe.simple.output=Welcome {0} you can now login to our website
|
||||
xxe.content.type.feedback.json=You are posting JSON which does not work with a XXE
|
||||
xxe.content.type.feedback.xml=You are posting XML but there is no XXE attack performed
|
||||
|
Reference in New Issue
Block a user