diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-27 06:33:51 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-27 06:33:51 +0000 |
commit | 4f0770f3df78ecd5dcaefbd214f7a1415366bca6 (patch) | |
tree | 72661b8f81594b855bcc967b819263f63fa30e17 /debian/perl-framework/t/security/CVE-2005-3352.t | |
parent | Adding upstream version 2.4.56. (diff) | |
download | apache2-4f0770f3df78ecd5dcaefbd214f7a1415366bca6.tar.xz apache2-4f0770f3df78ecd5dcaefbd214f7a1415366bca6.zip |
Adding debian version 2.4.56-1~deb11u2.debian/2.4.56-1_deb11u2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/perl-framework/t/security/CVE-2005-3352.t')
-rw-r--r-- | debian/perl-framework/t/security/CVE-2005-3352.t | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/debian/perl-framework/t/security/CVE-2005-3352.t b/debian/perl-framework/t/security/CVE-2005-3352.t new file mode 100644 index 0000000..b1881a9 --- /dev/null +++ b/debian/perl-framework/t/security/CVE-2005-3352.t @@ -0,0 +1,23 @@ +use strict; +use warnings FATAL => 'all'; + +use Apache::Test; +use Apache::TestUtil; +use Apache::TestRequest; + +my $vars = Apache::Test::vars(); + +plan tests => 2, need_imagemap; + +my $url = "/security/CVE-2005-3352.map"; + +my $r = GET $url, Referer => '">http://fish/'; + +ok t_cmp($r->code, 200, "response code is OK"); + +if ((!have_min_apache_version('2.3') && have_min_apache_version('2.2.24')) || + have_min_apache_version('2.4.4')) { + ok t_cmp($r->content, qr/%22%3e/, "referer was escaped"); +} else { + ok t_cmp($r->content, qr/\"/, "referer was escaped"); +} |