aboutsummaryrefslogtreecommitdiff
path: root/t/htmlize.t
diff options
context:
space:
mode:
authorJoey Hess <joey@kodama.kitenet.net>2008-02-10 12:21:20 -0500
committerJoey Hess <joey@kodama.kitenet.net>2008-02-10 12:21:20 -0500
commit5e47db9356e0881d0b0cf5135d6e63a64bcde545 (patch)
treeb13cfc8504c9fa088547a296ab0e924710d23b17 /t/htmlize.t
parent17246f6b45d02ab41d9c8c1dbe02e45bcab52e81 (diff)
downloadikiwiki-5e47db9356e0881d0b0cf5135d6e63a64bcde545.tar
ikiwiki-5e47db9356e0881d0b0cf5135d6e63a64bcde545.tar.gz
improved sanitiser test suite
Diffstat (limited to 't/htmlize.t')
-rwxr-xr-xt/htmlize.t35
1 files changed, 30 insertions, 5 deletions
diff --git a/t/htmlize.t b/t/htmlize.t
index 670500a67..9e2e3ec59 100755
--- a/t/htmlize.t
+++ b/t/htmlize.t
@@ -1,7 +1,7 @@
#!/usr/bin/perl
use warnings;
use strict;
-use Test::More tests => 5;
+use Test::More tests => 16;
use Encode;
BEGIN { use_ok("IkiWiki"); }
@@ -19,7 +19,32 @@ is(IkiWiki::htmlize("foo", "mdwn", readfile("t/test1.mdwn")),
"utf8; bug #373203");
ok(IkiWiki::htmlize("foo", "mdwn", readfile("t/test2.mdwn")),
"this file crashes markdown if it's fed in as decoded utf-8");
-my $ret=IkiWiki::htmlize("foo", "mdwn", readfile("t/javascript.mdwn"));
-ok($ret !~ /GOTCHA/,
- "javascript.mdwn contains a number of attempts at getting
- javascript that contains GOTCHA past the html sanitiser.");
+
+# embedded javascript sanitisation tests
+sub gotcha {
+ my $html=IkiWiki::htmlize("foo", "mdwn", shift);
+ return $html =~ /GOTCHA/;
+}
+ok(!gotcha(q{<a href="javascript:alert('GOTCHA')">click me</a>}),
+ "javascript url");
+ok(!gotcha(q{<a href="javascript&#x3A;alert('GOTCHA')">click me</a>}),
+ "partially encoded javascript url");
+ok(!gotcha(q{<a href="jscript:alert('GOTCHA')">click me</a>}),
+ "jscript url");
+ok(!gotcha(q{<a href="vbscript:alert('GOTCHA')">click me</a>}),
+ "vbscrpt url");
+ok(!gotcha(q{<a href="java script:alert('GOTCHA')">click me</a>}),
+ "java-tab-script url");
+ok(!gotcha(q{<span style="&#x61;&#x6e;&#x79;&#x3a;&#x20;&#x65;&#x78;&#x70;&#x72;&#x65;&#x73;&#x73;&#x69;&#x6f;(GOTCHA)&#x6e;&#x28;&#x77;&#x69;&#x6e;&#x64;&#x6f;&#x77;&#x2e;&#x6c;&#x6f;&#x63;&#x61;&#x74;&#x69;&#x6f;&#x6e;&#x3d;&#x27;&#x68;&#x74;&#x74;&#x70;&#x3a;&#x2f;&#x2f;&#x65;&#x78;&#x61;&#x6d;&#x70;&#x6c;&#x65;&#x2e;&#x6f;&#x72;&#x67;&#x2f;&#x27;&#x29;">foo</span>}),
+ "entity-encoded CSS script test");
+ok(!gotcha(q{<span style="&#97;&#110;&#121;&#58;&#32;&#101;&#120;&#112;&#114;&#101;&#115;&#115;&#105;&#111;&#110;(GOTCHA)&#40;&#119;&#105;&#110;&#100;&#111;&#119;&#46;&#108;&#111;&#99;&#97;&#116;&#105;&#111;&#110;&#61;&#39;&#104;&#116;&#116;&#112;&#58;&#47;&#47;&#101;&#120;&#97;&#109;&#112;&#108;&#101;&#46;&#111;&#114;&#103;&#47;&#39;&#41;">foo</span>}),
+ "another entity-encoded CSS script test");
+ok(!gotcha(q{<script>GOTCHA</script>}),
+ "script tag");
+ok(!gotcha(q{<span style="background: url(javascript:window.location=GOTCHA)">a</span>}),
+ "CSS script test");
+ok(gotcha(q{<p>javascript:alert('GOTCHA')</p>}),
+ "not javascript AFAIK (but perhaps some web browser would like to
+ be perverse and assume it is?)");
+ok(gotcha(q{<img src="javascript.png?GOTCHA">}), "not javascript");
+ok(gotcha(q{<a href="javascript.png?GOTCHA">foo</a>}), "not javascript");