package org.owasp.webgoat.lessons; import java.util.ArrayList; import java.util.List; import org.apache.ecs.Element; import org.owasp.webgoat.session.WebSession; /** * Copyright (c) 2002 Free Software Foundation developed under the custody of the Open Web * Application Security Project (http://www.owasp.org) This software package org.owasp.webgoat.is published by OWASP * under the GPL. You should read and accept the LICENSE before you use, modify and/or redistribute * this software. * * @author Jeff Williams Aspect Security * @created October 28, 2003 */ public class FailOpenAuthentication extends WeakAuthenticationCookie { /** * Description of the Method * * @param s Description of the Parameter * @return Description of the Return Value */ protected Element createContent( WebSession s ) { boolean logout = s.getParser().getBooleanParameter( LOGOUT, false ); if ( logout ) { s.setMessage( "Goodbye!" ); s.eatCookies(); return ( makeLogin( s ) ); } try { String username = ""; String password = ""; try { username = s.getParser().getRawParameter( USERNAME ); password = s.getParser().getRawParameter( PASSWORD ); // if credentials are bad, send the login page if ( !"webgoat".equals( username ) || !password.equals( "webgoat" ) ) { s.setMessage( "Invalid username and password entered." ); return ( makeLogin( s ) ); } } catch ( Exception e ) { // The parameter was omitted. set fail open status complete if ( username.length() > 0 && e.getMessage().indexOf( "not found") != -1 ) { if ( ( username != null ) && ( username.length() > 0 ) ) { makeSuccess( s ); return ( makeUser( s, username, "Fail Open Error Handling" ) ); } } } // Don't let the fail open pass with a blank password. if ( password.length() == 0 ) { // We make sure the username was submitted to avoid telling the user an invalid // username/password was entered when they first enter the lesson via the side menu. // This also suppresses the error if they just hit the login and both fields are empty. if ( username.length() != 0) { s.setMessage( "Invalid username and password entered." ); } return ( makeLogin( s ) ); } // otherwise authentication is good, show the content if ( ( username != null ) && ( username.length() > 0 ) ) { return ( makeUser( s, username, "Parameters. You did not exploit the fail open." ) ); } } catch ( Exception e ) { s.setMessage( "Error generating " + this.getClass().getName() ); } return ( makeLogin( s ) ); } /** * Gets the category attribute of the FailOpenAuthentication object * * @return The category value */ public Category getDefaultCategory() { return AbstractLesson.A7; } /** * Gets the hints attribute of the AuthenticateScreen object * * @return The hints value */ protected List getHints() { List hints = new ArrayList(); hints.add( "You can force errors during the authentication process." ); hints.add( "You can change length, existance, or values of authentication parameters." ); hints.add( "Try removing a parameter ENTIRELY with WebScarab." ); return hints; } /** * Gets the instructions attribute of the FailOpenAuthentication object * * @return The instructions value */ public String getInstructions(WebSession s) { return "Due to an error handling problem in the authentication mechanism, it is possible to authenticate " + "as the 'webgoat' user without entering a password. Try to login as the webgoat user without " + "specifying a password."; } private final static Integer DEFAULT_RANKING = new Integer(20); protected Integer getDefaultRanking() { return DEFAULT_RANKING; } /** * Gets the title attribute of the AuthenticateScreen object * * @return The title value */ public String getTitle() { return ( "How to Bypass a Fail Open Authentication Scheme" ); } }