8ec718c1ef
format
2023-06-15 19:26:33 +02:00
1df7ca61a3
Text content improvement
2023-06-15 19:26:33 +02:00
75398feca0
Add hints
2023-06-15 19:26:33 +02:00
ca886b4818
feat: upgrade to Spring Boot version 3 ( #1477 )
2023-06-04 11:19:47 +02:00
ac6de9d788
Fix typo of HijackSession_content0.adoc
2023-04-17 09:04:15 +02:00
cbf2e153d9
Restrict SSRF Regexes
2023-03-08 23:22:38 +01:00
e50986a098
fix: challenge 7 ( #1433 )
2023-02-22 22:55:48 +01:00
5dbe2eaf19
refactor: update challenge code
...
- Flags are now wired through a Spring config
- Introduced Flag class
- Removed Flags from the FlagController
2023-02-22 11:01:34 +01:00
ecfc321f14
feature: Add extra feedback once someone solves JWT refresh lesson differently
...
One can solve this lesson by using `alg:none` instead of using the refresh token flow. Instead of adding a check to force using the refresh token we opt for giving the user extra feedback.
2023-02-16 20:32:27 +00:00
73b8c431fc
chore: use constructor instead of field dependency injection
2023-02-16 20:32:27 +00:00
693771220c
fix: change url in JavaScript for JWT endpoint
...
The JavaScript pointed to the context root /WebWolf/ which is no longer in use.
2023-02-16 12:24:02 +00:00
075b1ab30a
Fix WebWolf JWT tool
2023-02-15 22:40:24 +00:00
390ff39f19
chore: format src/test/it as well
2023-02-15 19:01:06 +00:00
3ec34b0df5
fix: challenge test fails sometimes when calling scoreboard endpoint
2023-02-15 19:01:06 +00:00
ae081ce319
Add fileserver location (test)
2023-02-15 12:00:54 +00:00
bd398e4c09
#1396 Fix templates path for views
2023-02-15 11:58:49 +00:00
323daae578
Vulnerable components only work in a Docker container
2023-01-05 20:51:15 +01:00
3901814363
Fix documentation link for XXE mitigation.
2023-01-05 19:00:12 +01:00
59bfd7c6d4
Move XXE to A05 - Security Misconfiguration
2023-01-05 19:00:12 +01:00
dca415099f
Remove unused JavaScript function
2023-01-05 11:33:00 +01:00
54e115aff0
Update the solution with WebWolf URLs
...
The new solution uses WebWolf paths as these will change automatically when a user start WebGoat on a different port. It no longer depends on the hardcoded port `8080`.
2023-01-05 11:02:45 +01:00
fcaa2d8589
Fix zip slip lesson.
...
The lesson did not work properly as the directory is reused across several path traversal lessons. First thing before uploading the zip file we now clean the directory.
The html had a reference to a location of the profile picture, this was part of a hint but this only causes confusion as this is not indicating to where you need to upload the picture with the Zip Slip vulnerability.
The assignment now contains a direct hint as where the image needs to be saved. The assignment is about creating a vulnerable zip file and NOT about guessing where the image should be saved inside WebGoat.
2023-01-05 11:02:45 +01:00
9666597164
- Add reference to the WebWolf icon in the top right corner.
...
- Format all text of the lesson
2023-01-04 08:07:51 +01:00
d2a1546dff
Apply formatting
...
This will make sure we have a consistent style across our project and the PRs are only concerned with actual changes and no longer about style.
2023-01-04 08:07:23 +01:00
b03777d39b
Support boolean
when parsing the token.
...
When the admin json element passes as a `boolean`:
```
{
"admin": true
}
```
the parsing is now successful.
2023-01-04 07:43:18 +01:00
32468ff90b
Add sql lesson ( #1370 )
2023-01-04 07:42:29 +01:00
71ec36102f
Fix typo
2022-12-01 21:34:19 +01:00
8db9ff30be
Fixed incorrect word
...
while "wear" and "were" have similar pronunciation, one of them is better here than the other :)
2022-11-29 18:55:44 +01:00
b51be74cab
typofix
2022-11-28 17:10:14 +01:00
96c2595ad0
Update interface name to exploit
...
The name is
org.owasp.webgoat.lessons.vulnerablecomponents.Contact
not
org.owasp.webgoat.vulnerablecomponents.Contact
2022-09-21 22:32:16 +02:00
34f5b79249
isReadable works inside a container, isFile not ( #1334 )
2022-09-12 09:02:07 +02:00
f5e4d4717a
FixTypo - Fix typo in various lesson documentations
2022-08-30 22:21:22 +02:00
50f932b02e
Renamed to webwolfintroduction
2022-07-31 22:39:21 +02:00
251167c6b0
Renamed to webgoatintroduction
2022-07-31 22:39:21 +02:00
256c1dd3aa
Renamed to vulnerablecomponents
2022-07-31 22:39:21 +02:00
b93c935d6c
Renamed to sqlinjection
2022-07-31 22:39:21 +02:00
827a9d3467
Renamed to securepasswords
2022-07-31 22:39:21 +02:00
91470b93ea
Renamed to pathtraversal
2022-07-31 22:39:21 +02:00
37d684fdd3
Renamed to passwordreset
2022-07-31 22:39:21 +02:00
4f911c64a1
Renamed to missingac
2022-07-31 22:39:21 +02:00
e0a0a80ad9
Renamed to lessontemplate
2022-07-31 22:39:21 +02:00
26c289d7d4
Renamed to insecurelogin
2022-07-31 22:39:21 +02:00
1eff81718b
Renamed to httpproxies
2022-07-31 22:39:21 +02:00
08ce1add01
Renamed to httpbasics
2022-07-31 22:39:21 +02:00
25948306bd
Renamed to htmltampering
2022-07-31 22:39:21 +02:00
1c86f465dc
Renamed to clientsidefiltering
2022-07-31 22:39:21 +02:00
3b330fb328
Renamed to chromedevtools
2022-07-31 22:39:21 +02:00
8a35316985
Rename to bypassrestrictions
2022-07-31 22:39:21 +02:00
c63345e4ee
Rename authbypass
2022-07-31 22:39:21 +02:00
005b9f03a4
search the menu using input box ( #1317 )
...
* working version
* change onchange to oninput with minimum of three chars
* working version with delay and fix for category click
2022-07-31 20:45:09 +02:00