Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1079)

Unified Diff: third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/svg-animate-href-expected.txt

Issue 2524013002: XSS Auditor: Block by default. (Closed)
Patch Set: Rebase+Test Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/svg-animate-href-expected.txt
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/svg-animate-href-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/svg-animate-href-expected.txt
index 99c45512b5fb4a29d842326fe38bc1c26b264fd6..bb29d7a848f21b93485773ec7d20c47bc2178016 100644
--- a/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/svg-animate-href-expected.txt
+++ b/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/svg-animate-href-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%3E%3Ca%3E%3Ccircle%20r=100%20/%3E%3Canimate%20attributeName=href%20values=%3Bjavascript%3Aalert(1)%20begin=0s%20end=0.1s%20fill=freeze%20/%3E%3C/a%3E%3C/svg%3E&notifyDone=1&dumpElementBySelector=animate' because its source code was found within the request. The auditor was enabled as the server did not send an 'X-XSS-Protection' header.
+CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%3E%3Ca%3E%3Ccircle%20r=100%20/%3E%3Canimate%20attributeName=href%20values=%3Bjavascript%3Aalert(1)%20begin=0s%20end=0.1s%20fill=freeze%20/%3E%3C/a%3E%3C/svg%3E&notifyDone=1&dumpElementBySelector=animate' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.

Powered by Google App Engine
This is Rietveld 408576698