summaryrefslogtreecommitdiffstats
path: root/src/de/fhswf/in/inf/fit/aufgabe3/LoginServlet.java
blob: 3106ecb9528d7046259372d5f02de7f082c91881 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
package de.fhswf.in.inf.fit.aufgabe3;

import java.io.IOException;
import java.io.PrintWriter;

import javax.servlet.ServletException;
import javax.servlet.annotation.WebInitParam;
import javax.servlet.annotation.WebServlet;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;

/**
 * Servlet implementation class LoginServlet
 */
@WebServlet(urlPatterns = { "/LoginServlet" }, initParams = {
      @WebInitParam(name = "username", value = "admin"),
      @WebInitParam(name = "password", value = "12345") })
public class LoginServlet extends HttpServlet
{
   private static final long serialVersionUID = 1L;

   /**
    * @see HttpServlet#HttpServlet()
    */
   public LoginServlet()
   {
      super();
   }

   /**
    * @see HttpServlet#doGet(HttpServletRequest request, HttpServletResponse
    *      response)
    */
   protected void doGet(HttpServletRequest request,
         HttpServletResponse response) throws ServletException, IOException
   {
      response.sendRedirect("LoginForm.jsp");
   }

   /**
    * @see HttpServlet#doPost(HttpServletRequest request, HttpServletResponse
    *      response)
    */
   protected void doPost(HttpServletRequest request,
         HttpServletResponse response) throws ServletException, IOException
   {
      String validUsername = getInitParameter("username").toLowerCase();
      String validPassword = getInitParameter("password");

      String requestUsername = request.getParameter("username").toLowerCase();
      String requestPassword = request.getParameter("password");

      if (requestUsername == null || requestPassword == null)
      {
         doGet(request, response);
      }

      PrintWriter pw = response.getWriter();

      pw.println("<!DOCTYPE html>");
      pw.println("<html>");
      pw.println("<head>");
      pw.println("<meta charset=\"utf-8\" />");
      pw.println("<title>Login Answer</title>");
      pw.println("</head>");
      pw.println("<body>");

      // This is very insecure and can be exploited via timing attacks
      if (requestUsername.equals(validUsername)
            && requestPassword.equals(validPassword))
      {
         pw.println("<h1>Success</h1>");
      }
      else
      {
         pw.println("<h1>Failed</h1>");
         pw.println("<a href=\"LoginForm.jsp\">Retry</a>");
      }

      pw.println("</body>");
      pw.println("</html>");
   }
}