diff --git a/src/main/java/org/t246osslab/easybuggy4sb/core/filters/AuthenticationFilter.java b/src/main/java/org/t246osslab/easybuggy4sb/core/filters/AuthenticationFilter.java
index de6d188..c2d49a4 100644
--- a/src/main/java/org/t246osslab/easybuggy4sb/core/filters/AuthenticationFilter.java
+++ b/src/main/java/org/t246osslab/easybuggy4sb/core/filters/AuthenticationFilter.java
@@ -40,7 +40,7 @@ public void doFilter(ServletRequest req, ServletResponse res, FilterChain chain)
HttpServletResponse response = (HttpServletResponse) res;
String target = request.getRequestURI();
- if (target.startsWith("/admins") || "/uid/serverinfo.html".equals(target) || "/serverinfo".equals(target)) {
+ if (target.startsWith("/admins") || "/uid/serverinfo.jsp".equals(target) || "/serverinfo".equals(target)) {
/* Login (authentication) is needed to access admin pages (under /admins). */
String loginType = request.getParameter("logintype");
diff --git a/src/main/resources/messages.properties b/src/main/resources/messages.properties
index 5578a03..50962be 100644
--- a/src/main/resources/messages.properties
+++ b/src/main/resources/messages.properties
@@ -275,7 +275,7 @@ msg.note.socket.leak.occur=Network socket leak occurs every time you load this p
msg.note.unrestricted.ext.upload=If you upload JSP file (named exit.jsp) including <% System.exit(0); %>
and access to http://localhost:8080/uploadFiles/exit.jsp, \
then JavaVM is forcibly finished.
msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http://localhost:8080/uid/, then you can see the file list in the uid directory. \
-If you login as an acount written in http://localhost:8080/uid/adminpassword.txt you can access to /uid/serverinfo.html.
+If you login as an acount written in http://localhost:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
msg.note.unrestricted.size.upload=This page is vulnerable for attacks such as DoS because there are no limitation for uploading file size.
msg.note.verbose.errror.message=You can login with admin
and password
. \
It is easy to guess an account who can logs in since authentication error messages on this page is too detailed.
diff --git a/src/main/resources/messages_de.properties b/src/main/resources/messages_de.properties
index 0acdd7a..3c2fad4 100644
--- a/src/main/resources/messages_de.properties
+++ b/src/main/resources/messages_de.properties
@@ -263,7 +263,7 @@ msg.note.null.byte.injection=If using Java earlier than version 1.7.0_40 and you
msg.note.open.redirect=You can login with admin
and password
. \nIf you add goto\=[an URL of a malicious site]
to the query string, you can redirect to the malicious site.
msg.note.socket.leak.occur=Network socket leak occurs every time you load this page.
msg.note.unrestricted.ext.upload=If you upload JSP file (named exit.jsp) including <% System.exit(0); %>
and access to http\://localhost\:8080/uploadFiles/exit.jsp, \nthen JavaVM is forcibly finished.
-msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.html.
+msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
msg.note.unrestricted.size.upload=This page is vulnerable for attacks such as DoS because there are no limitation for uploading file size.
msg.note.verbose.errror.message=You can login with admin
and password
. \nIt is easy to guess an account who can logs in since authentication error messages on this page is too detailed.
msg.note.xee=If you upload the following XML file, it will waste server resources.
diff --git a/src/main/resources/messages_en.properties b/src/main/resources/messages_en.properties
index 0acdd7a..3c2fad4 100644
--- a/src/main/resources/messages_en.properties
+++ b/src/main/resources/messages_en.properties
@@ -263,7 +263,7 @@ msg.note.null.byte.injection=If using Java earlier than version 1.7.0_40 and you
msg.note.open.redirect=You can login with admin
and password
. \nIf you add goto\=[an URL of a malicious site]
to the query string, you can redirect to the malicious site.
msg.note.socket.leak.occur=Network socket leak occurs every time you load this page.
msg.note.unrestricted.ext.upload=If you upload JSP file (named exit.jsp) including <% System.exit(0); %>
and access to http\://localhost\:8080/uploadFiles/exit.jsp, \nthen JavaVM is forcibly finished.
-msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.html.
+msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
msg.note.unrestricted.size.upload=This page is vulnerable for attacks such as DoS because there are no limitation for uploading file size.
msg.note.verbose.errror.message=You can login with admin
and password
. \nIt is easy to guess an account who can logs in since authentication error messages on this page is too detailed.
msg.note.xee=If you upload the following XML file, it will waste server resources.
diff --git a/src/main/resources/messages_es.properties b/src/main/resources/messages_es.properties
index 0acdd7a..3c2fad4 100644
--- a/src/main/resources/messages_es.properties
+++ b/src/main/resources/messages_es.properties
@@ -263,7 +263,7 @@ msg.note.null.byte.injection=If using Java earlier than version 1.7.0_40 and you
msg.note.open.redirect=You can login with admin
and password
. \nIf you add goto\=[an URL of a malicious site]
to the query string, you can redirect to the malicious site.
msg.note.socket.leak.occur=Network socket leak occurs every time you load this page.
msg.note.unrestricted.ext.upload=If you upload JSP file (named exit.jsp) including <% System.exit(0); %>
and access to http\://localhost\:8080/uploadFiles/exit.jsp, \nthen JavaVM is forcibly finished.
-msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.html.
+msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
msg.note.unrestricted.size.upload=This page is vulnerable for attacks such as DoS because there are no limitation for uploading file size.
msg.note.verbose.errror.message=You can login with admin
and password
. \nIt is easy to guess an account who can logs in since authentication error messages on this page is too detailed.
msg.note.xee=If you upload the following XML file, it will waste server resources.
diff --git a/src/main/resources/messages_fr.properties b/src/main/resources/messages_fr.properties
index 0acdd7a..3c2fad4 100644
--- a/src/main/resources/messages_fr.properties
+++ b/src/main/resources/messages_fr.properties
@@ -263,7 +263,7 @@ msg.note.null.byte.injection=If using Java earlier than version 1.7.0_40 and you
msg.note.open.redirect=You can login with admin
and password
. \nIf you add goto\=[an URL of a malicious site]
to the query string, you can redirect to the malicious site.
msg.note.socket.leak.occur=Network socket leak occurs every time you load this page.
msg.note.unrestricted.ext.upload=If you upload JSP file (named exit.jsp) including <% System.exit(0); %>
and access to http\://localhost\:8080/uploadFiles/exit.jsp, \nthen JavaVM is forcibly finished.
-msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.html.
+msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
msg.note.unrestricted.size.upload=This page is vulnerable for attacks such as DoS because there are no limitation for uploading file size.
msg.note.verbose.errror.message=You can login with admin
and password
. \nIt is easy to guess an account who can logs in since authentication error messages on this page is too detailed.
msg.note.xee=If you upload the following XML file, it will waste server resources.
diff --git a/src/main/resources/messages_ja.properties b/src/main/resources/messages_ja.properties
index b17306d..7958bb9 100644
--- a/src/main/resources/messages_ja.properties
+++ b/src/main/resources/messages_ja.properties
@@ -263,7 +263,7 @@ msg.note.null.byte.injection=\u30d0\u30fc\u30b8\u30e7\u30f31.7.0_40\u3088\u308a\
msg.note.open.redirect=admin
\u3068password
\u3092\u5165\u529b\u3059\u308b\u3068\u3001\u30ed\u30b0\u30a4\u30f3\u3067\u304d\u307e\u3059\u3002\n\u30af\u30a8\u30ea\u30b9\u30c8\u30ea\u30f3\u30b0\u306bgoto\=[\u60aa\u610f\u306e\u3042\u308b\u30b5\u30a4\u30c8\u306eURL]
\u3092\u4ed8\u52a0\u3059\u308b\u3068\u3001\u30c1\u30a7\u30c3\u30af\u305b\u305a\u306b\u60aa\u610f\u306e\u3042\u308b\u30b5\u30a4\u30c8\u306eURL\u306b\u30ea\u30c0\u30a4\u30ec\u30af\u30c8\u3057\u307e\u3059\u3002
msg.note.socket.leak.occur=\u3053\u306e\u30da\u30fc\u30b8\u3092\u8aad\u307f\u8fbc\u3080\u305f\u3073\u306b\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30bd\u30b1\u30c3\u30c8\u30ea\u30fc\u30af\u304c\u767a\u751f\u3057\u307e\u3059\u3002
msg.note.unrestricted.ext.upload=<% System.exit(0); %>
\u3068\u66f8\u3044\u305fJSP\u30d5\u30a1\u30a4\u30eb(\u30d5\u30a1\u30a4\u30eb\u540d\uff1aexit.jsp)\u3092\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3057\u3066\u3001http\://localhost\:8080/uploadFiles/exit.jsp\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3068\u3001\nJavaVM\u304c\u5f37\u5236\u7d42\u4e86\u3057\u307e\u3059\u3002
-msg.note.unintended.file.disclosure=\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u30ea\u30b9\u30c6\u30a3\u30f3\u30b0\u304c\u6a5f\u80fd\u3057\u3066\u3044\u308b\u5834\u5408\u3001http\://localhost\:8080/uid/\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3068\u3001\u305d\u306e\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u5185\u306e\u30d5\u30a1\u30a4\u30eb\u4e00\u89a7\u304c\u8868\u793a\u3055\u308c\u307e\u3059\u3002\n\u3055\u3089\u306bhttp\://localhost\:8080/uid/adminpassword.txt\u306b\u8a18\u8f09\u3055\u308c\u305f\u30a2\u30ab\u30a6\u30f3\u30c8\u3067\u30ed\u30b0\u30a4\u30f3\u3059\u308b\u3068\u3001http\://localhost\:8080/uid/serverinfo.html\u3078\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002
+msg.note.unintended.file.disclosure=\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u30ea\u30b9\u30c6\u30a3\u30f3\u30b0\u304c\u6a5f\u80fd\u3057\u3066\u3044\u308b\u5834\u5408\u3001http\://localhost\:8080/uid/\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3068\u3001\u305d\u306e\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u5185\u306e\u30d5\u30a1\u30a4\u30eb\u4e00\u89a7\u304c\u8868\u793a\u3055\u308c\u307e\u3059\u3002\n\u3055\u3089\u306bhttp\://localhost\:8080/uid/adminpassword.txt\u306b\u8a18\u8f09\u3055\u308c\u305f\u30a2\u30ab\u30a6\u30f3\u30c8\u3067\u30ed\u30b0\u30a4\u30f3\u3059\u308b\u3068\u3001http\://localhost\:8080/uid/serverinfo.jsp\u3078\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002
msg.note.unrestricted.size.upload=\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u53ef\u80fd\u306a\u30d5\u30a1\u30a4\u30eb\u30b5\u30a4\u30ba\u306e\u5236\u9650\u304c\u7121\u3044\u305f\u3081\u3001DoS\u653b\u6483\u306a\u3069\u306b\u5bfe\u3057\u3066\u8106\u5f31\u3067\u3059\u3002
msg.note.verbose.errror.message=admin
\u3068password
\u3092\u5165\u529b\u3059\u308b\u3068\u3001\u30ed\u30b0\u30a4\u30f3\u3067\u304d\u307e\u3059\u3002\n\u3053\u306e\u753b\u9762\u3067\u306e\u8a8d\u8a3c\u30a8\u30e9\u30fc\u306e\u30e1\u30c3\u30bb\u30fc\u30b8\u306f\u8a73\u7d30\u904e\u304e\u308b\u305f\u3081\u3001\u30ed\u30b0\u30a4\u30f3\u53ef\u80fd\u306a\u30a2\u30ab\u30a6\u30f3\u30c8\u304c\u63a8\u6e2c\u3057\u3084\u3059\u304f\u306a\u3063\u3066\u3044\u307e\u3059\u3002
msg.note.xee=\u4ee5\u4e0b\u306eXML\u30d5\u30a1\u30a4\u30eb\u3092\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3059\u308b\u3068\u3001\u30b5\u30fc\u30d0\u30fc\u30ea\u30bd\u30fc\u30b9\u3092\u6d6a\u8cbb\u3057\u307e\u3059\u3002
diff --git a/src/main/resources/messages_ko.properties b/src/main/resources/messages_ko.properties
index 0acdd7a..3c2fad4 100644
--- a/src/main/resources/messages_ko.properties
+++ b/src/main/resources/messages_ko.properties
@@ -263,7 +263,7 @@ msg.note.null.byte.injection=If using Java earlier than version 1.7.0_40 and you
msg.note.open.redirect=You can login with admin
and password
. \nIf you add goto\=[an URL of a malicious site]
to the query string, you can redirect to the malicious site.
msg.note.socket.leak.occur=Network socket leak occurs every time you load this page.
msg.note.unrestricted.ext.upload=If you upload JSP file (named exit.jsp) including <% System.exit(0); %>
and access to http\://localhost\:8080/uploadFiles/exit.jsp, \nthen JavaVM is forcibly finished.
-msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.html.
+msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
msg.note.unrestricted.size.upload=This page is vulnerable for attacks such as DoS because there are no limitation for uploading file size.
msg.note.verbose.errror.message=You can login with admin
and password
. \nIt is easy to guess an account who can logs in since authentication error messages on this page is too detailed.
msg.note.xee=If you upload the following XML file, it will waste server resources.
diff --git a/src/main/resources/messages_ru.properties b/src/main/resources/messages_ru.properties
index 0acdd7a..3c2fad4 100644
--- a/src/main/resources/messages_ru.properties
+++ b/src/main/resources/messages_ru.properties
@@ -263,7 +263,7 @@ msg.note.null.byte.injection=If using Java earlier than version 1.7.0_40 and you
msg.note.open.redirect=You can login with admin
and password
. \nIf you add goto\=[an URL of a malicious site]
to the query string, you can redirect to the malicious site.
msg.note.socket.leak.occur=Network socket leak occurs every time you load this page.
msg.note.unrestricted.ext.upload=If you upload JSP file (named exit.jsp) including <% System.exit(0); %>
and access to http\://localhost\:8080/uploadFiles/exit.jsp, \nthen JavaVM is forcibly finished.
-msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.html.
+msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
msg.note.unrestricted.size.upload=This page is vulnerable for attacks such as DoS because there are no limitation for uploading file size.
msg.note.verbose.errror.message=You can login with admin
and password
. \nIt is easy to guess an account who can logs in since authentication error messages on this page is too detailed.
msg.note.xee=If you upload the following XML file, it will waste server resources.
diff --git a/src/main/resources/messages_zh.properties b/src/main/resources/messages_zh.properties
index 0acdd7a..3c2fad4 100644
--- a/src/main/resources/messages_zh.properties
+++ b/src/main/resources/messages_zh.properties
@@ -263,7 +263,7 @@ msg.note.null.byte.injection=If using Java earlier than version 1.7.0_40 and you
msg.note.open.redirect=You can login with admin
and password
. \nIf you add goto\=[an URL of a malicious site]
to the query string, you can redirect to the malicious site.
msg.note.socket.leak.occur=Network socket leak occurs every time you load this page.
msg.note.unrestricted.ext.upload=If you upload JSP file (named exit.jsp) including <% System.exit(0); %>
and access to http\://localhost\:8080/uploadFiles/exit.jsp, \nthen JavaVM is forcibly finished.
-msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.html.
+msg.note.unintended.file.disclosure=If the directory listing feature works and you access to http\://localhost\:8080/uid/, then you can see the file list in the uid directory. \nIf you login as an acount written in http\://localhost\:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
msg.note.unrestricted.size.upload=This page is vulnerable for attacks such as DoS because there are no limitation for uploading file size.
msg.note.verbose.errror.message=You can login with admin
and password
. \nIt is easy to guess an account who can logs in since authentication error messages on this page is too detailed.
msg.note.xee=If you upload the following XML file, it will waste server resources.
diff --git a/src/main/resources/templates/adminmain.html b/src/main/resources/templates/adminmain.html
index 7fdbc80..4f27951 100644
--- a/src/main/resources/templates/adminmain.html
+++ b/src/main/resources/templates/adminmain.html
@@ -5,7 +5,7 @@