![]() Server : Apache System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64 User : corals ( 1002) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /home/corals/old/dev/tests/integration/testsuite/Magento/Payment/Block/Transparent/ |
<?php /** * Copyright © Magento, Inc. All rights reserved. * See COPYING.txt for license details. */ namespace Magento\Payment\Block\Transparent; /** * Test for \Magento\Payment\Block\Transparent\Iframe */ class IframeTest extends \PHPUnit\Framework\TestCase { /** * @magentoAppIsolation enabled * @magentoAppArea frontend * @dataProvider xssDataProvider */ public function testToHtml($xssString) { /** @var $block Iframe */ $block = \Magento\TestFramework\Helper\Bootstrap::getObjectManager()->get( \Magento\Framework\View\LayoutInterface::class )->createBlock( \Magento\Payment\Block\Transparent\Iframe::class ); $block->setTemplate('transparent/iframe.phtml'); $block->setData( 'params', [ 'redirect' => $xssString, 'redirect_parent' => $xssString, 'error_msg' => $xssString ] ); $content = $block->toHtml(); $this->assertStringNotContainsString($xssString, $content, 'Params must be escaped'); $this->assertStringContainsString($block->escapeJs($xssString), $content, 'Content must be present'); } /** * @return array */ public function xssDataProvider() { return [ ['</script><script>alert("XSS")</script>'], ['javascript%3Aalert%28String.fromCharCode%280x78%29%2BString.fromCharCode%280x73%29%2BString.' . 'fromCharCode%280x73%29%29'], ['javascript:alert(String.fromCharCode(0x78)+String.fromCharCode(0x73)+String.fromCharCode(0x73))'] ]; } }