From fbf2a079c8ea0fbc799e1f61415cede03e3114c9 Mon Sep 17 00:00:00 2001
From: mayhew64 In this case only localhost, ip1 and ip2 are permitted to connect.
+WebGoat requires the following users and roles to be configured in order for the application to run.
+
"));
+ + getWebgoatContext().getFeedbackAddressHTML() + "
"));
return ec;
}
diff --git a/webgoat/main/project/JavaSource/org/owasp/webgoat/session/WebgoatContext.java b/webgoat/main/project/JavaSource/org/owasp/webgoat/session/WebgoatContext.java
index 5a8f29fa6..49eb28d0d 100755
--- a/webgoat/main/project/JavaSource/org/owasp/webgoat/session/WebgoatContext.java
+++ b/webgoat/main/project/JavaSource/org/owasp/webgoat/session/WebgoatContext.java
@@ -34,7 +34,9 @@ public class WebgoatContext
public final static String DEFUSEOSCOMMANDS = "DefuseOSCommands";
- public final static String FEEDBACK_ADDRESS = "FeedbackAddress";
+ public final static String FEEDBACK_ADDRESS_HTML = "FeedbackAddressHTML";
+
+ public final static String FEEDBACK_ADDRESS = "email";
public final static String DEBUG = "debug";
@@ -64,7 +66,9 @@ public class WebgoatContext
private boolean codingExercises = false;
- private String feedbackAddress = "webgoat@owasp.org";
+ private String feedbackAddress = "webgoat@owasp.org";
+
+ private String feedbackAddressHTML = "webgoat@owasp.org";
private boolean isDebug = false;
@@ -88,6 +92,8 @@ public class WebgoatContext
defuseOSCommands = "true".equals(getParameter(servlet, DEFUSEOSCOMMANDS));
enterprise = "true".equals(getParameter(servlet, ENTERPRISE));
codingExercises = "true".equals(getParameter(servlet, CODING_EXERCISES));
+ feedbackAddressHTML = getParameter(servlet, FEEDBACK_ADDRESS_HTML) != null ? getParameter(servlet, FEEDBACK_ADDRESS_HTML)
+ : feedbackAddressHTML;
feedbackAddress = getParameter(servlet, FEEDBACK_ADDRESS) != null ? getParameter(servlet, FEEDBACK_ADDRESS)
: feedbackAddress;
showRequest = "true".equals(getParameter(servlet, SHOWREQUEST));
@@ -175,6 +181,11 @@ public class WebgoatContext
return feedbackAddress;
}
+ public String getFeedbackAddressHTML()
+ {
+ return feedbackAddressHTML;
+ }
+
public boolean isDebug()
{
return isDebug;
diff --git a/webgoat/main/project/WebContent/WEB-INF/web.xml b/webgoat/main/project/WebContent/WEB-INF/web.xml
index a7acfa348..ea46dea27 100755
--- a/webgoat/main/project/WebContent/WEB-INF/web.xml
+++ b/webgoat/main/project/WebContent/WEB-INF/web.xml
@@ -111,6 +111,15 @@
Users Configuration
+WebGoat Default Users and Roles for Tomcat
+
+
+ >role rolename="webgoat_basic"/<
+ >role rolename="webgoat_admin"/<
+ >role rolename="webgoat_user"/<
+ >user username="webgoat" password="webgoat" roles="webgoat_admin"/<
+ >user username="basic" password="basic" roles="webgoat_user,webgoat_basic"/<
+ >user username="guest" password="guest" roles="webgoat_user"/<
+
+
Usually using WebGoat you just use the user guest with the password guest. But maybe in laboratory you have made a setup with one server and a lot of @@ -93,8 +106,8 @@ Adding a user is straight forward. You can use the guest entry as an example. Th users should have the same role as the guest user. Add lines like this to the file:
- <user name="user1" password="password1" roles="webgoat_user"/> - <user name="user2" password="password2" roles="webgoat_user"/> + <user name="student1" password="password1" roles="webgoat_user"/> + <user name="student2" password="password2" roles="webgoat_user"/> ...diff --git a/webgoat/main/project/WebContent/lesson_plans/UsefulTools.html b/webgoat/main/project/WebContent/lesson_plans/UsefulTools.html index 3368211ef..e56bfb74a 100644 --- a/webgoat/main/project/WebContent/lesson_plans/UsefulTools.html +++ b/webgoat/main/project/WebContent/lesson_plans/UsefulTools.html @@ -2,12 +2,11 @@
-Below is a list of tools we've found useful in solving the WebGoat lessons. You will need WebScarab -to solve most of the lessons.
+Below is a list of tools we've found useful in solving the WebGoat lessons. You will need WebScarab or Paros to solve most of the lessons.
Like WebGoat, WebScarab is a part of OWASP.
-WebScarab is a framework for analyzing applications that
+WebScarab is a proxy for analyzing applications that
communicate using the HTTP and HTTPS protocols. Because WebScarab
operates as an intercepting proxy, we can review and modify requests
and responses.
-IEWatch is a tool to analyse HTTP and HTML for users of the Internet Explorer.
-There exist a lot of vulnerability scanner for your own web applications. They can find XSS, Injection Flaws and other vulnerabilities. Here the links to two open source scanner.
@@ -22,7 +21,7 @@ Webpage:http://www.getfirebu
IEWatch:
+IEWatch is a tool to analyze HTTP and HTML for users of the Internet Explorer.
Webpage:http://www.iewatch.com
Scanner:
+There are many vulnerability scanners for your own web applications. They can find XSS, Injection Flaws and other vulnerabilities. Below are links to two open source scanner.
Nessus:http://www.nessus.org
Paros:http://www.parosproxy.org