https://bugs.webkit.org/show_bug.cgi?id=83794
Reviewed by Adam Barth.
Several changes needed to make the XSS in these test cases fire against actual
vulnerable browsers. The tests were still valid, but it is more helpful to see
the XSS pop up.
* http/tests/security/xssAuditor/script-tag-inside-svg-tag.html:
* http/tests/security/xssAuditor/script-tag-inside-svg-tag2.html:
* http/tests/security/xssAuditor/script-tag-inside-svg-tag3.html:
git-svn-id: http://svn.webkit.org/repository/webkit/trunk@114010
268f45cc-cd09-0410-ab3c-
d52691b4dbfc
+2012-04-12 Tom Sepez <tsepez@chromium.org>
+
+ Typos in LayoutTests/http/tests/security/xssAuditor/script-tag-inside-svg-tag*.html
+ https://bugs.webkit.org/show_bug.cgi?id=83794
+
+ Reviewed by Adam Barth.
+
+ Several changes needed to make the XSS in these test cases fire against actual
+ vulnerable browsers. The tests were still valid, but it is more helpful to see
+ the XSS pop up.
+
+ * http/tests/security/xssAuditor/script-tag-inside-svg-tag.html:
+ * http/tests/security/xssAuditor/script-tag-inside-svg-tag2.html:
+ * http/tests/security/xssAuditor/script-tag-inside-svg-tag3.html:
+
2012-04-09 Victoria Kirst <vrk@chromium.org>
Remove setTimeout from media/video-seek-past-end-paused.html and fix other minor issues
</script>
</head>
<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg><script>//%26%24x0a;alert%26%23x29;String.fromCharCode(0x58,0x53,0x53))</svg></script>">
+<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg><script>%2f%2f%26%23x0a%3balert%26%23x28%3bString.fromCharCode(0x58,0x53,0x53))</script></svg>">
</iframe>
Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed.
</body>
</script>
</head>
<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<div><i>x</i></div>&q=<svg><script><!--&q2=-->%26%24x0a;alert%26%23x29;String.fromCharCode(0x58,0x53,0x53))</svg></script>">
+<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<div><i>x</i></div>&q=<svg><script><!--&q2=-->%26%23x0a%3balert%26%23x28%3bString.fromCharCode(0x58,0x53,0x53))</script></svg>">
</iframe>
Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed even with <!-- comments -->.
</body>
</script>
</head>
<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<script>alert(1)</script>&q=<svg><script>&q2=alert(0);</script></svg>">
+<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<script>alert(1)</script>&q=<svg><script>&q2=alert(0)</script></svg>">
</iframe>
Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed even with nested script blocks.
</body>