部分XSS攻击测试
This commit is contained in:
@@ -36,11 +36,17 @@ describe('test XSS', function () {
|
||||
// 属性内的特殊字符
|
||||
assert.equal(xss('<a href="\'<<>>">'), '<a href="\'<<>>">');
|
||||
assert.equal(xss('<a href=""">'), '<a href=\"\"\">');
|
||||
assert.equal(xss('<a h=href="oo">'), '<a>');
|
||||
assert.equal(xss('<a h= href="oo">'), '<a href="oo">');
|
||||
|
||||
// 自动将属性值的单引号转为双引号
|
||||
assert.equal(xss('<a href=\'abcd\'>'), '<a href="abcd">');
|
||||
assert.equal(xss('<a href=\'"\'>'), '<a href=""e;">');
|
||||
|
||||
// 没有双引号括起来的属性值
|
||||
assert.equal(xss('<a href=home>'), '<a href="home">');
|
||||
assert.equal(xss('<a href=home class="b">'), '<a href="home" class="b">');
|
||||
|
||||
});
|
||||
|
||||
it('#white list', function () {
|
||||
@@ -67,4 +73,21 @@ describe('test XSS', function () {
|
||||
|
||||
});
|
||||
|
||||
// XSS攻击测试:https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
|
||||
it('#XSS_Filter_Evasion_Cheat_Sheet', function () {
|
||||
|
||||
assert.equal(xss('></SCRIPT>">\'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>'),
|
||||
'></SCRIPT>">\'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>');
|
||||
|
||||
assert.equal(xss(';!--"<XSS>=&{()}'), ';!--"<XSS>=&{()}');
|
||||
|
||||
assert.equal(xss('<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'),
|
||||
'<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>');
|
||||
|
||||
assert.equal(xss('<IMG SRC="javascript:alert(\'XSS\');">'), '<img src="#">');
|
||||
|
||||
//assert.equal(xss('<IMG SRC=javascript:alert(\'XSS\')>'), '<img src="#">');
|
||||
|
||||
});
|
||||
|
||||
});
|
||||
|
||||
Reference in New Issue
Block a user