├── CRSFGuard
├── Readme.md
└── bountyguard.zip
├── JavaEncoder
├── Readme.md
├── app
│ ├── .gitignore
│ ├── WebContent
│ │ ├── WEB-INF
│ │ │ └── web.xml
│ │ └── index.jsp
│ ├── pom.xml
│ └── src
│ │ └── EncodeAction.java
└── war-files
│ └── OWASPJavaEncoderTest.war
├── JavaHTMLSanitizer
├── Readme.md
├── app
│ ├── .gitignore
│ ├── WebContent
│ │ ├── WEB-INF
│ │ │ └── web.xml
│ │ └── index.jsp
│ ├── pom.xml
│ └── src
│ │ └── SanitizeAction.java
└── war-files
│ └── OWASPHTMLSanitizerTest.war
└── README.md
/CRSFGuard/Readme.md:
--------------------------------------------------------------------------------
1 | CRSFGuard Bounty
2 | ============================
3 |
4 | This is a version of Apache Shiro web application using OWASP CRSFGuard to protect forms and Post request with a unique token
5 |
6 | #Bounty Researchers read here:
7 | Bug Hunters please visit BugCrowd page for the scope:
8 | *OWASPCRSFGuard:https://bugcrowd.com/owaspcrsfguard?preview=db24e118ea34e13a78677ea8374f790c05cbd08ef4f0ddcf
9 |
10 |
11 | ##About the project
12 |
13 | This project can be run from Eclipse Mars using Jetty
14 | Eclipse Java EE IDE for Web Developers.
15 | Version: Mars Release (4.5.0)
16 | Build id: 20150621-1200
17 |
18 | Using Eclipse Jetty 3.9.0
19 | Available through the marketplace
20 |
21 | or simply by running from command line : mvn jetty:run
22 |
23 | ##Instructions
24 | The web app is using Stormpath as OAUTH. In order to run this properly you must obtain a apiKey as instructed in the Apache Shiro Documentation to setup Stormpath:
25 | http://shiro.apache.org/webapp-tutorial.html#step2
26 | Make sure you set get an apiKey.properties file with your key
27 | Make sure you edit the information in the Shiro.ini file:
28 |
--------------------------------------------------------------------------------
/CRSFGuard/bountyguard.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/OWASP/OWASPBugBounty/7f05e9565bdbfa05074f0d37af2cea5c12727d1a/CRSFGuard/bountyguard.zip
--------------------------------------------------------------------------------
/JavaEncoder/Readme.md:
--------------------------------------------------------------------------------
1 | #OWASP Java Encoder Bug Bounty
2 |
3 | This simple web application is hosting a single web form that is protected from XSS by the OWASP Java Encoder Project. This form will accept input in a variety of different contents in an HTML document and then render that input properly encoded in the reponse.
4 |
5 | ##Details
6 |
7 | The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!
8 |
9 |
--------------------------------------------------------------------------------
/JavaEncoder/app/.gitignore:
--------------------------------------------------------------------------------
1 | /target/
2 | /.settings/
3 | .classpath
4 | .project
5 |
--------------------------------------------------------------------------------
/JavaEncoder/app/WebContent/WEB-INF/web.xml:
--------------------------------------------------------------------------------
1 |
2 |
elements can have any value below. 42 | .allowAttributes("align") 43 | .matching(true, "center", "left", "right", "justify", "char") 44 | .onElements("p") 45 | // These elements are allowed. 46 | .allowElements( 47 | "a", "p", "div", "i", "b", "em", "blockquote", "tt", "strong", 48 | "br", "ul", "ol", "li") 49 | // Custom slashdot tags. 50 | // These could be rewritten in the sanitizer using an ElementPolicy. 51 | .allowElements("quote", "ecode") 52 | // Allows for tests against new CSS sanitization 53 | .allowStyling() 54 | .toFactory(); 55 | 56 | //accepting user content and converting nulls to empty strings 57 | String usercontent = request.getParameter("usercontent"); 58 | if (usercontent == null) usercontent = ""; 59 | 60 | PrintWriter out = response.getWriter(); 61 | out.println ( 62 | ""+ 63 | " \n" + 64 | "
\n" + 65 | "\n" + 66 | "