forked from Wavyzz/dolibarr
Debug v21
This commit is contained in:
@@ -126,6 +126,7 @@ class SecurityGETPOSTTest extends CommonClassTest
|
||||
$_POST["param18"] = '<span style="background-image: url(...?...action=aaa)">abc</span>';
|
||||
$_POST["param19"] = '<a href="j	a	v	asc
ri	pt:(alert(document.cookie))">XSS</a>';
|
||||
//$_POST["param19"]='<a href="javascript:alert(document.cookie)">XSS</a>';
|
||||
$_GET["param20"] = '<link rel="dns-prefetch" href="//cdnjs.cloudflare.com" />';
|
||||
|
||||
|
||||
|
||||
@@ -415,6 +416,10 @@ class SecurityGETPOSTTest extends CommonClassTest
|
||||
print __METHOD__." result=".$result."\n";
|
||||
$this->assertEquals('<span style="background-image: url(...?...aaa)">abc</span>', $result, 'Test anytag with a forbidden value for attribute');
|
||||
|
||||
$result = GETPOST("param20", 'restricthtmlallowlinkscript');
|
||||
print __METHOD__." result param20 = ".$result."\n";
|
||||
$this->assertEquals('<link rel="dns-prefetch" href="//cdnjs.cloudflare.com">', $result);
|
||||
|
||||
|
||||
unset($conf->global->MAIN_RESTRICTHTML_REMOVE_ALSO_BAD_ATTRIBUTES);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user