Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(691)

Side by Side Diff: LayoutTests/http/tests/security/xssAuditor/script-tag-expression-follows.html

Issue 205243002: XSSAuditor bypass with script tag and expression following injection point (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Incorporate dbates's suggestions. Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <script> 4 <script>
5 if (window.testRunner) { 5 if (window.testRunner) {
6 testRunner.dumpAsText(); 6 testRunner.dumpAsText();
7 testRunner.setXSSAuditorEnabled(true); 7 testRunner.setXSSAuditorEnabled(true);
8 } 8 }
9 </script> 9 </script>
10 </head> 10 </head>
11 <body> 11 <body>
12 <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.p l?q=<iframe%20src='http://127.0.0.1:8000/'></iframe>"> 12 <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.p l?script-expression-follows=1&q=<script>alert('XSS')">
13 </iframe> 13 </iframe>
14 </body> 14 </body>
15 </html> 15 </html>
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698