Index: LayoutTests/http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt |
diff --git a/LayoutTests/http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt b/LayoutTests/http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt |
index 2df0571f61241f697f2f8d4f2607fcdd1827e713..34c3f78757249f8ea6e1eab66d3a2a067d1c5909 100644 |
--- a/LayoutTests/http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt |
+++ b/LayoutTests/http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt |
@@ -1,3 +1,3 @@ |
-CONSOLE MESSAGE: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=,&q=%3Cscript%20x='1&%3E&q2=1'%3Ealert(String.fromCharCode(0x58,0x53,0x53,0x31))%3C/script%3E' because its source code was found within the request. The auditor was enabled as the server sent neither an 'X-XSS-Protection' nor 'Content-Security-Policy' header. |
+CONSOLE MESSAGE: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=,&q=%3Cscript%20x=%271&%3E&q2=1%27%3Ealert(String.fromCharCode(0x58,0x53,0x53,0x31))%3C/script%3E' because its source code was found within the request. The auditor was enabled as the server sent neither an 'X-XSS-Protection' nor 'Content-Security-Policy' header. |
Test that the XSSAuditor catches the specific case where the IIS webserver resovles multiply occuring query parameters by concatenating them before passing the result to the application. Conceptually, its as if ?a=1&a=2 becomes ?a=1,2. The test passes if the XSSAuditor logs console messages and no alerts fire. |