Sha256: a419e91720fa14b9ad8b5124f3a7c95901bc3f349253c043285c325004560f35

Contents?: true

Size: 1.25 KB

Versions: 3

Compression:

Stored size: 1.25 KB

Contents

# encoding: utf-8
require_relative 'common'

# Miscellaneous attempts to sneak maliciously crafted CSS past Sanitize. Some of
# these are courtesy of (or inspired by) the OWASP XSS Filter Evasion Cheat
# Sheet.
#
# https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet

describe 'Malicious CSS' do
  make_my_diffs_pretty!
  parallelize_me!

  before do
    @s = Sanitize::CSS.new(Sanitize::Config::RELAXED)
  end

  it 'should not be possible to inject an expression by munging it with a comment' do
    _(@s.properties(%[width:expr/*XSS*/ession(alert('XSS'))])).
      must_equal ''

    _(@s.properties(%[width:ex/*XSS*//*/*/pression(alert("XSS"))])).
      must_equal ''
  end

  it 'should not be possible to inject an expression by munging it with a newline' do
    _(@s.properties(%[width:\nexpression(alert('XSS'));])).
      must_equal ''
  end

  it 'should not allow the javascript protocol' do
    _(@s.properties(%[background-image:url("javascript:alert('XSS')");])).
      must_equal ''

    _(Sanitize.fragment(%[<div style="background-image: url(&#1;javascript:alert('XSS'))">],
      Sanitize::Config::RELAXED)).must_equal '<div></div>'
  end

  it 'should not allow behaviors' do
    _(@s.properties(%[behavior: url(xss.htc);])).must_equal ''
  end
end

Version data entries

3 entries across 3 versions & 2 rubygems

Version Path
mumukit-content-type-1.12.1 vendor/bundle/ruby/2.7.0/gems/sanitize-6.0.1/test/test_malicious_css.rb
mumukit-content-type-1.12.0 vendor/bundle/ruby/2.7.0/gems/sanitize-6.0.1/test/test_malicious_css.rb
sanitize-6.0.1 test/test_malicious_css.rb