| Index: LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
|
| diff --git a/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt b/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
|
| index 9a8838a7de48360204db6d4d2ca569e4c65fbe03..7e2f8712144e59900218d20d6c2b6231a866819c 100644
|
| --- a/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
|
| +++ b/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
|
| @@ -1,4 +1,4 @@
|
| -CONSOLE MESSAGE: line 1: Uncaught SecurityError: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match.
|
| +CONSOLE ERROR: line 1: Uncaught SecurityError: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match.
|
| This page opens a window to "", injects malicious code, and then uses window.open.call to set its opener to the victim. The opened window then tries to scripts its opener.
|
| Code injected into window:
|
| <script>function write(target, message) { target.document.body.innerHTML = message; }
|
|
|