improved sanitiser test suite
parent
17246f6b45
commit
5e47db9356
35
t/htmlize.t
35
t/htmlize.t
|
@ -1,7 +1,7 @@
|
||||||
#!/usr/bin/perl
|
#!/usr/bin/perl
|
||||||
use warnings;
|
use warnings;
|
||||||
use strict;
|
use strict;
|
||||||
use Test::More tests => 5;
|
use Test::More tests => 16;
|
||||||
use Encode;
|
use Encode;
|
||||||
|
|
||||||
BEGIN { use_ok("IkiWiki"); }
|
BEGIN { use_ok("IkiWiki"); }
|
||||||
|
@ -19,7 +19,32 @@ is(IkiWiki::htmlize("foo", "mdwn", readfile("t/test1.mdwn")),
|
||||||
"utf8; bug #373203");
|
"utf8; bug #373203");
|
||||||
ok(IkiWiki::htmlize("foo", "mdwn", readfile("t/test2.mdwn")),
|
ok(IkiWiki::htmlize("foo", "mdwn", readfile("t/test2.mdwn")),
|
||||||
"this file crashes markdown if it's fed in as decoded utf-8");
|
"this file crashes markdown if it's fed in as decoded utf-8");
|
||||||
my $ret=IkiWiki::htmlize("foo", "mdwn", readfile("t/javascript.mdwn"));
|
|
||||||
ok($ret !~ /GOTCHA/,
|
# embedded javascript sanitisation tests
|
||||||
"javascript.mdwn contains a number of attempts at getting
|
sub gotcha {
|
||||||
javascript that contains GOTCHA past the html sanitiser.");
|
my $html=IkiWiki::htmlize("foo", "mdwn", shift);
|
||||||
|
return $html =~ /GOTCHA/;
|
||||||
|
}
|
||||||
|
ok(!gotcha(q{<a href="javascript:alert('GOTCHA')">click me</a>}),
|
||||||
|
"javascript url");
|
||||||
|
ok(!gotcha(q{<a href="javascript:alert('GOTCHA')">click me</a>}),
|
||||||
|
"partially encoded javascript url");
|
||||||
|
ok(!gotcha(q{<a href="jscript:alert('GOTCHA')">click me</a>}),
|
||||||
|
"jscript url");
|
||||||
|
ok(!gotcha(q{<a href="vbscript:alert('GOTCHA')">click me</a>}),
|
||||||
|
"vbscrpt url");
|
||||||
|
ok(!gotcha(q{<a href="java script:alert('GOTCHA')">click me</a>}),
|
||||||
|
"java-tab-script url");
|
||||||
|
ok(!gotcha(q{<span style="any: expressio(GOTCHA)n(window.location='http://example.org/')">foo</span>}),
|
||||||
|
"entity-encoded CSS script test");
|
||||||
|
ok(!gotcha(q{<span style="any: expression(GOTCHA)(window.location='http://example.org/')">foo</span>}),
|
||||||
|
"another entity-encoded CSS script test");
|
||||||
|
ok(!gotcha(q{<script>GOTCHA</script>}),
|
||||||
|
"script tag");
|
||||||
|
ok(!gotcha(q{<span style="background: url(javascript:window.location=GOTCHA)">a</span>}),
|
||||||
|
"CSS script test");
|
||||||
|
ok(gotcha(q{<p>javascript:alert('GOTCHA')</p>}),
|
||||||
|
"not javascript AFAIK (but perhaps some web browser would like to
|
||||||
|
be perverse and assume it is?)");
|
||||||
|
ok(gotcha(q{<img src="javascript.png?GOTCHA">}), "not javascript");
|
||||||
|
ok(gotcha(q{<a href="javascript.png?GOTCHA">foo</a>}), "not javascript");
|
||||||
|
|
|
@ -1,9 +0,0 @@
|
||||||
<a href="javascript:alert('GOTCHA')">click me</a>
|
|
||||||
<a href="javascript:alert('GOTCHA')">click me</a>
|
|
||||||
<a href="jscript:alert('GOTCHA')">click me</a>
|
|
||||||
<a href="vbscript:alert('GOTCHA')">click me</a>
|
|
||||||
<a href="java\tscript:alert('GOTCHA')">click me</a>
|
|
||||||
<span style="any: expressio(GOTCHA)n(window.location='http://example.org/')">entity-encoded CSS script test</span>
|
|
||||||
<span style="any: expression(GOTCHA)(window.location='http://example.org/')">entity-encoded CSS script test</span>
|
|
||||||
<script>GOTCHA</script>
|
|
||||||
<span style="background: url(javascript:window.location=GOTCHA)">CSS script test</span>
|
|
Loading…
Reference in New Issue