Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[M101] Sanitize DragData markup before inserting it into document
(cherry picked from commit 5164a0f) Fixed: 1315040 Change-Id: I8a0ddfb983d12c185f7e943d3d5277788199b011 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/3579670 Quick-Run: Xiaocheng Hu <xiaochengh@chromium.org> Auto-Submit: Xiaocheng Hu <xiaochengh@chromium.org> Reviewed-by: Kent Tamura <tkent@chromium.org> Commit-Queue: Kent Tamura <tkent@chromium.org> Cr-Original-Commit-Position: refs/heads/main@{#991324} Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/3588887 Bot-Commit: Rubber Stamper <rubber-stamper@appspot.gserviceaccount.com> Cr-Commit-Position: refs/branch-heads/4951@{#831} Cr-Branched-From: 27de622-refs/heads/main@{#982481}
- Loading branch information
1 parent
ff57286
commit e2b8856
Showing
2 changed files
with
49 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
47 changes: 47 additions & 0 deletions
47
third_party/blink/web_tests/editing/pasteboard/drag-and-drop-svg-use-sanitize.html
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
<!doctype html> | ||
<script src="../../resources/testharness.js"></script> | ||
<script src="../../resources/testharnessreport.js"></script> | ||
|
||
<div id="drag-from" draggable=true>Drag from</div> | ||
<div id="drag-to" contenteditable>Drag to</div> | ||
|
||
<script> | ||
function computePoint(element) { | ||
return { | ||
x: element.offsetLeft + element.offsetWidth / 2, | ||
y: element.offsetTop + element.offsetHeight / 2 | ||
}; | ||
} | ||
|
||
let dragged = false; | ||
let executed = false; | ||
const payload = ` | ||
<svg><use href="data:image/svg+xml,<svg id='x' xmlns='http://www.w3.org/2000/svg'><image href='fake' onerror='executed=true' /></svg>#x" /> | ||
`; | ||
|
||
const dragFrom = document.getElementById('drag-from'); | ||
dragFrom.ondragstart = event => { | ||
dragged = true; | ||
event.dataTransfer.setData('text/html', payload); | ||
} | ||
|
||
const dragTo = document.getElementById('drag-to'); | ||
|
||
promise_test(async test => { | ||
assert_own_property(window, 'eventSender', 'This test requires eventSender to simulate drag and drop'); | ||
|
||
const fromPoint = computePoint(dragFrom); | ||
eventSender.mouseMoveTo(fromPoint.x, fromPoint.y); | ||
eventSender.mouseDown(); | ||
|
||
const toPoint = computePoint(dragTo); | ||
eventSender.mouseMoveTo(toPoint.x, toPoint.y); | ||
eventSender.mouseUp(); | ||
|
||
assert_true(dragged, 'Element should be dragged'); | ||
|
||
// The 'error' event is dispatched asynchronously. | ||
await new Promise(resolve => test.step_timeout(resolve, 100)); | ||
assert_false(executed, 'Script should be blocked'); | ||
}, 'Script in SVG use href should be sanitized'); | ||
</script> |