blob: 158dc4943e46b5ef7a08c1630d78b47b90845bbd (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
|
package de.fhswf.in.inf.fit.aufgabe3;
import java.io.IOException;
import java.io.PrintWriter;
import javax.servlet.ServletException;
import javax.servlet.annotation.WebInitParam;
import javax.servlet.annotation.WebServlet;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
/**
* Servlet implementation class LoginServlet
*/
@WebServlet(urlPatterns = { "/LoginServlet" }, initParams = {
@WebInitParam(name = "username", value = "admin"),
@WebInitParam(name = "password", value = "12345") })
public class LoginServlet extends HttpServlet
{
private static final long serialVersionUID = 1L;
/**
* @see HttpServlet#HttpServlet()
*/
public LoginServlet()
{
super();
}
/**
* @see HttpServlet#doGet(HttpServletRequest request, HttpServletResponse
* response)
*/
protected void doGet(HttpServletRequest request,
HttpServletResponse response) throws ServletException, IOException
{
response.sendRedirect("LoginForm.jsp");
}
/**
* @see HttpServlet#doPost(HttpServletRequest request, HttpServletResponse
* response)
*/
protected void doPost(HttpServletRequest request,
HttpServletResponse response) throws ServletException, IOException
{
String validUsername = getInitParameter("username");
String validPassword = getInitParameter("password");
String requestUsername = request.getParameter("username");
String requestPassword = request.getParameter("password");
if (requestUsername == null || requestPassword == null)
{
doGet(request, response);
}
PrintWriter pw = response.getWriter();
pw.println("<!DOCTYPE html>");
pw.println("<html>");
pw.println("<head>");
pw.println("<meta charset=\"utf-8\" />");
pw.println("<title>Login Answer</title>");
pw.println("</head>");
pw.println("<body>");
// This is very insecure and can be exploited via timing attacks
if (requestUsername.equals(validUsername)
&& requestPassword.equals(validPassword))
{
pw.println("<h1>Success</h1>");
}
else
{
pw.println("<h1>Failed</h1>");
pw.println("<a href=\"LoginForm.jsp\">Retry</a>");
}
pw.println("</body>");
pw.println("</html>");
}
}
|