aboutsummaryrefslogtreecommitdiffstats
path: root/actionpack/test/template
diff options
context:
space:
mode:
authorAndrew Carpenter <andrew@criticaljuncture.org>2016-07-28 16:12:21 -0700
committerAaron Patterson <aaron.patterson@gmail.com>2016-08-10 15:22:31 -0700
commit4bcccf5ecd81a6272479537911b7d9760c5be164 (patch)
treeb4b963ba1d9ad119180b8506813480b7a8fe1706 /actionpack/test/template
parent1ac2ddbc433ec96dd06affb6f10f33d9eb12d52a (diff)
downloadrails-4bcccf5ecd81a6272479537911b7d9760c5be164.tar.gz
rails-4bcccf5ecd81a6272479537911b7d9760c5be164.tar.bz2
rails-4bcccf5ecd81a6272479537911b7d9760c5be164.zip
ensure tag/content_tag escapes " in attribute vals
Many helpers mark content as HTML-safe without escaping double quotes -- including `sanitize`. Regardless of whether or not the attribute values are HTML-escaped, we want to be sure they don't include double quotes, as that can cause XSS issues. For example: `content_tag(:div, "foo", title: sanitize('" onmouseover="alert(1);//'))` CVE-2016-6316
Diffstat (limited to 'actionpack/test/template')
-rw-r--r--actionpack/test/template/tag_helper_test.rb10
1 files changed, 10 insertions, 0 deletions
diff --git a/actionpack/test/template/tag_helper_test.rb b/actionpack/test/template/tag_helper_test.rb
index e36295569e..9c3d636765 100644
--- a/actionpack/test/template/tag_helper_test.rb
+++ b/actionpack/test/template/tag_helper_test.rb
@@ -101,6 +101,16 @@ class TagHelperTest < ActionView::TestCase
end
end
+ def test_tag_does_not_honor_html_safe_double_quotes_as_attributes
+ assert_dom_equal '<p title="&quot;">content</p>',
+ content_tag('p', "content", title: '"'.html_safe)
+ end
+
+ def test_data_tag_does_not_honor_html_safe_double_quotes_as_attributes
+ assert_dom_equal '<p data-title="&quot;">content</p>',
+ content_tag('p', "content", data: { title: '"'.html_safe })
+ end
+
def test_skip_invalid_escaped_attributes
['&1;', '&#1dfa3;', '& #123;'].each do |escaped|
assert_equal %(<a href="#{escaped.gsub(/&/, '&amp;')}" />), tag('a', :href => escaped)