Index: LayoutTests/http/tests/security/aboutBlank/xss-DENIED-navigate-opener-javascript-url-expected.txt |
diff --git a/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-navigate-opener-javascript-url-expected.txt b/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-navigate-opener-javascript-url-expected.txt |
deleted file mode 100644 |
index 0c389ff627e87e2f53720f9a691ea19b47d60796..0000000000000000000000000000000000000000 |
--- a/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-navigate-opener-javascript-url-expected.txt |
+++ /dev/null |
@@ -1,16 +0,0 @@ |
-CONSOLE MESSAGE: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match. |
-CONSOLE MESSAGE: line 1: TypeError: 'undefined' is not an object (evaluating 'target.document.body') |
-This page opens a window to "", injects malicious code, and then navigates its opener to the victim. The opened window then tries to scripts its opener after reloading itself as a javascript URL. |
-Code injected into window: |
-<script>window.location = 'javascript:\'<script>function write(target, message) { target.document.body.innerHTML = message; }setTimeout(function() {write(window.opener, \\\'FAIL: XSS was allowed.\\\');}, 100);setTimeout(function() {write(window.opener.top.frames[1], \\\'SUCCESS: Window remained in original SecurityOrigin.\\\');}, 200);setTimeout(function() { if (window.testRunner) testRunner.globalFlag = true; }, 300);<\\\/script>\''</script> |
- |
- |
--------- |
-Frame: '<!--framePath //<!--frame0-->-->' |
--------- |
-This page doesn't do anything special (except signal that it has finished loading). |
- |
--------- |
-Frame: '<!--framePath //<!--frame1-->-->' |
--------- |
-SUCCESS: Window remained in original SecurityOrigin. |