improved sanitiser test suite
parent
17246f6b45
commit
5e47db9356
35
t/htmlize.t
35
t/htmlize.t
|
@ -1,7 +1,7 @@
|
|||
#!/usr/bin/perl
|
||||
use warnings;
|
||||
use strict;
|
||||
use Test::More tests => 5;
|
||||
use Test::More tests => 16;
|
||||
use Encode;
|
||||
|
||||
BEGIN { use_ok("IkiWiki"); }
|
||||
|
@ -19,7 +19,32 @@ is(IkiWiki::htmlize("foo", "mdwn", readfile("t/test1.mdwn")),
|
|||
"utf8; bug #373203");
|
||||
ok(IkiWiki::htmlize("foo", "mdwn", readfile("t/test2.mdwn")),
|
||||
"this file crashes markdown if it's fed in as decoded utf-8");
|
||||
my $ret=IkiWiki::htmlize("foo", "mdwn", readfile("t/javascript.mdwn"));
|
||||
ok($ret !~ /GOTCHA/,
|
||||
"javascript.mdwn contains a number of attempts at getting
|
||||
javascript that contains GOTCHA past the html sanitiser.");
|
||||
|
||||
# embedded javascript sanitisation tests
|
||||
sub gotcha {
|
||||
my $html=IkiWiki::htmlize("foo", "mdwn", shift);
|
||||
return $html =~ /GOTCHA/;
|
||||
}
|
||||
ok(!gotcha(q{<a href="javascript:alert('GOTCHA')">click me</a>}),
|
||||
"javascript url");
|
||||
ok(!gotcha(q{<a href="javascript:alert('GOTCHA')">click me</a>}),
|
||||
"partially encoded javascript url");
|
||||
ok(!gotcha(q{<a href="jscript:alert('GOTCHA')">click me</a>}),
|
||||
"jscript url");
|
||||
ok(!gotcha(q{<a href="vbscript:alert('GOTCHA')">click me</a>}),
|
||||
"vbscrpt url");
|
||||
ok(!gotcha(q{<a href="java script:alert('GOTCHA')">click me</a>}),
|
||||
"java-tab-script url");
|
||||
ok(!gotcha(q{<span style="any: expressio(GOTCHA)n(window.location='http://example.org/')">foo</span>}),
|
||||
"entity-encoded CSS script test");
|
||||
ok(!gotcha(q{<span style="any: expression(GOTCHA)(window.location='http://example.org/')">foo</span>}),
|
||||
"another entity-encoded CSS script test");
|
||||
ok(!gotcha(q{<script>GOTCHA</script>}),
|
||||
"script tag");
|
||||
ok(!gotcha(q{<span style="background: url(javascript:window.location=GOTCHA)">a</span>}),
|
||||
"CSS script test");
|
||||
ok(gotcha(q{<p>javascript:alert('GOTCHA')</p>}),
|
||||
"not javascript AFAIK (but perhaps some web browser would like to
|
||||
be perverse and assume it is?)");
|
||||
ok(gotcha(q{<img src="javascript.png?GOTCHA">}), "not javascript");
|
||||
ok(gotcha(q{<a href="javascript.png?GOTCHA">foo</a>}), "not javascript");
|
||||
|
|
|
@ -1,9 +0,0 @@
|
|||
<a href="javascript:alert('GOTCHA')">click me</a>
|
||||
<a href="javascript:alert('GOTCHA')">click me</a>
|
||||
<a href="jscript:alert('GOTCHA')">click me</a>
|
||||
<a href="vbscript:alert('GOTCHA')">click me</a>
|
||||
<a href="java\tscript:alert('GOTCHA')">click me</a>
|
||||
<span style="any: expressio(GOTCHA)n(window.location='http://example.org/')">entity-encoded CSS script test</span>
|
||||
<span style="any: expression(GOTCHA)(window.location='http://example.org/')">entity-encoded CSS script test</span>
|
||||
<script>GOTCHA</script>
|
||||
<span style="background: url(javascript:window.location=GOTCHA)">CSS script test</span>
|
Loading…
Reference in New Issue