Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(105)

Unified Diff: LayoutTests/http/tests/security/xssAuditor/script-tag-expression-follows-expected.txt

Issue 205243002: XSSAuditor bypass with script tag and expression following injection point (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Incorporate dbates's suggestions. Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: LayoutTests/http/tests/security/xssAuditor/script-tag-expression-follows-expected.txt
diff --git a/LayoutTests/http/tests/security/xssAuditor/script-tag-expression-follows-expected.txt b/LayoutTests/http/tests/security/xssAuditor/script-tag-expression-follows-expected.txt
new file mode 100644
index 0000000000000000000000000000000000000000..f8fbadb9404a5948b9c958c36abe08aebc34b152
--- /dev/null
+++ b/LayoutTests/http/tests/security/xssAuditor/script-tag-expression-follows-expected.txt
@@ -0,0 +1,2 @@
+CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?script-expression-follows=1&q=%3Cscript%3Ealert(%27XSS%27)' because its source code was found within the request. The auditor was enabled as the server sent neither an 'X-XSS-Protection' nor 'Content-Security-Policy' header.
+

Powered by Google App Engine
This is Rietveld 408576698