diff --git a/.github/scripts/docker-create-and-push.sh b/.github/scripts/docker-create-and-push.sh index 375ba0839..6deeb0242 100755 --- a/.github/scripts/docker-create-and-push.sh +++ b/.github/scripts/docker-create-and-push.sh @@ -35,7 +35,7 @@ echo "buildarg supplied: $buildarg" echo "check if al required binaries are installed" source ../../scripts/check-available-commands.sh -checkCommandsAvailable java git docker mvn +checkCommandsAvailable java git docker mvn gsed echo "Start building assets required for container" @@ -49,10 +49,11 @@ SECENDKEYPART4=$(openssl rand -base64 3 | tr -d '\n') echo -n "${SECENDKEYPART1}9${SECENDKEYPART2}6${SECENDKEYPART3}2${SECENDKEYPART4}7" > secondkey.txt printf "function secret() { \n var password = \"$SECENDKEYPART1\" + 9 + \"$SECENDKEYPART2\" + 6 + \"$SECENDKEYPART3\" + 2 + \"$SECENDKEYPART4\" + 7;\n return password;\n }\n" > ../../js/index.js echo "generating challenge 17" +rm thirdkey.txt openssl rand -base64 32 | tr -d '\n' > thirdkey.txt answer=$( . This will allow you to run challenges 1-8, 12-15. +Run `./k8s-vault-minkube-start.sh`, when the script is done, then the challenges will wait for you at . This will allow you to run challenges 1-8, 12-17. When you stopped the `k8s-vault-minikube-start.sh` script and want to resume the port forward run: `k8s-vault-minikube-resume.sh`. This is because if you run the start script again it will replace the secret in the vault and not update the secret-challenge application with the new secret. ## Cloud Challenges -_Can be used for challenges 1-16_ +_Can be used for challenges 1-17_ **READ THIS**: Given that the exercises below contain IAM privilege escalation exercises, never run this on an account which is related to your production environment or can influence your account-over-arching resources. diff --git a/aws/k8s/secret-challenge-vault-deployment.yml b/aws/k8s/secret-challenge-vault-deployment.yml index 394809903..69a635bf0 100644 --- a/aws/k8s/secret-challenge-vault-deployment.yml +++ b/aws/k8s/secret-challenge-vault-deployment.yml @@ -37,7 +37,7 @@ spec: volumeAttributes: secretProviderClass: "wrongsecrets-aws-secretsmanager" containers: - - image: jeroenwillemsen/wrongsecrets:1.4.0-k8s-vault + - image: jeroenwillemsen/wrongsecrets:1.4.1-k8s-vault imagePullPolicy: IfNotPresent ports: - containerPort: 8080 diff --git a/azure/k8s/secret-challenge-vault-deployment.yml.tpl b/azure/k8s/secret-challenge-vault-deployment.yml.tpl index 9a0e2c733..f4e87de6e 100644 --- a/azure/k8s/secret-challenge-vault-deployment.yml.tpl +++ b/azure/k8s/secret-challenge-vault-deployment.yml.tpl @@ -35,7 +35,7 @@ spec: volumeAttributes: secretProviderClass: "azure-wrongsecrets-vault" containers: - - image: jeroenwillemsen/wrongsecrets:1.4.0-k8s-vault + - image: jeroenwillemsen/wrongsecrets:1.4.1-k8s-vault imagePullPolicy: IfNotPresent ports: - containerPort: 8080 diff --git a/gcp/k8s/secret-challenge-vault-deployment.yml.tpl b/gcp/k8s/secret-challenge-vault-deployment.yml.tpl index 56914b11a..21d967a35 100644 --- a/gcp/k8s/secret-challenge-vault-deployment.yml.tpl +++ b/gcp/k8s/secret-challenge-vault-deployment.yml.tpl @@ -37,7 +37,7 @@ spec: volumeAttributes: secretProviderClass: "wrongsecrets-gcp-secretsmanager" containers: - - image: jeroenwillemsen/wrongsecrets:1.4.0-k8s-vault + - image: jeroenwillemsen/wrongsecrets:1.4.1-k8s-vault imagePullPolicy: IfNotPresent ports: - containerPort: 8080 diff --git a/js/index.js b/js/index.js index e1e4ab417..f7d1f24d0 100644 --- a/js/index.js +++ b/js/index.js @@ -1,4 +1,4 @@ function secret() { - var password = "kY3HAYM=" + 9 + "iKBa" + 6 + "vQo=" + 2 + "VpEk" + 7; + var password = "jLJIQZM=" + 9 + "aG7l" + 6 + "LAQ=" + 2 + "UdiM" + 7; return password; } diff --git a/k8s/secret-challenge-deployment.yml b/k8s/secret-challenge-deployment.yml index 75687be77..5336fc69b 100644 --- a/k8s/secret-challenge-deployment.yml +++ b/k8s/secret-challenge-deployment.yml @@ -28,7 +28,7 @@ spec: runAsGroup: 2000 fsGroup: 2000 containers: - - image: jeroenwillemsen/wrongsecrets:1.4.0-no-vault + - image: jeroenwillemsen/wrongsecrets:1.4.1-no-vault imagePullPolicy: IfNotPresent ports: - containerPort: 8080 diff --git a/k8s/secret-challenge-vault-deployment.yml b/k8s/secret-challenge-vault-deployment.yml index 9685c541d..7149e7513 100644 --- a/k8s/secret-challenge-vault-deployment.yml +++ b/k8s/secret-challenge-vault-deployment.yml @@ -30,7 +30,7 @@ spec: runAsNonRoot: true serviceAccountName: vault containers: - - image: jeroenwillemsen/wrongsecrets:1.4.0-k8s-vault + - image: jeroenwillemsen/wrongsecrets:1.4.1-k8s-vault imagePullPolicy: IfNotPresent ports: - containerPort: 8080 diff --git a/pom.xml b/pom.xml index 0a7489a3e..7b1525fec 100644 --- a/pom.xml +++ b/pom.xml @@ -9,7 +9,7 @@ org.owasp wrongsecrets - 1.4.1-dev-SNAPSHOT + 1.4.1-SNAPSHOT OWASP WrongSecrets Examples with how to not use secrets https://owasp.org/www-project-wrongsecrets/ diff --git a/secretscache/curl.sh b/secretscache/curl.sh new file mode 100644 index 000000000..03643e280 --- /dev/null +++ b/secretscache/curl.sh @@ -0,0 +1,3 @@ +#!/bin/bash + +curl -H Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ== https://en.wikipedia.org/wiki/Basic_access_authentication diff --git a/src/main/resources/.bash_history b/src/main/resources/.bash_history index c7ccb55d5..3104ef7b9 100644 --- a/src/main/resources/.bash_history +++ b/src/main/resources/.bash_history @@ -709,4 +709,4 @@ w pinky history pwd -cat .bash_history \ No newline at end of file +cat .bash_history