Files
front/dist/assets/vendor/tom-select/test/tests/xss.js
2021-12-28 13:34:18 +01:00

63 lines
1.7 KiB
JavaScript

var setup_xss_test = function(html, options, done) {
window.xss = function() {
window.clearTimeout(timeout);
complete(new Error('Exploit executed'));
};
var test = setup_test(html, options);
var complete = function(err) {
window.xss = function() {};
done(err);
};
var timeout = window.setTimeout(complete, 75);
return test;
};
describe('XSS', function() {
it_n('Raw HTML in original input value should not trigger exploit', function(done) {
setup_xss_test('<input type="text" value="&lt;img src=&quot;x&quot; onerror=&quot;xss()&quot;&gt;">', {}, done);
});
it_n('Raw HTML in optgroup label should not trigger exploit', function(done) {
var test = setup_xss_test('<select><optgroup label="&lt;img src=&quot;x&quot; onerror=&quot;xss()&quot;&gt;"><option>Test</option></optgroup></select>', {}, done);
test.instance.refreshOptions();
test.instance.open();
});
it_n('Raw HTML in option label should not trigger exploit', function(done) {
setup_xss_test('<input type="text" value="">', {
options: [
{value: '1', label: '<img src="x" onerror="xss()">'}
],
items: ['1'],
}, done);
});
it_n('Raw HTML in option value should not trigger exploit', function(done) {
setup_xss_test('<input type="text" value="">', {
options: [
{value: '<img src="x" onerror="xss()">', label: '1'}
],
items: ['<img src="x" onerror="xss()">'],
}, done);
});
it_n('Custom templates should not trigger exploit', function(done) {
setup_xss_test('<input type="text" value="">', {
options: [
{value:'1',label: '<img src="x" onerror="xss()">'}
],
items: ['1'],
render:{
'item': function(data, escape) {
return '<div>' + escape(data.label) + '</div>';
},
}
}, done);
});
});