summaryrefslogtreecommitdiffstats
path: root/debian/perl-framework/t/security/CVE-2005-3352.t
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 15:01:31 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 15:01:31 +0000
commitc9cf025fadfe043f0f2f679e10d1207d8a158bb6 (patch)
tree3a94effe0bdc0a6814d8134f4ed840d7cc6b6f19 /debian/perl-framework/t/security/CVE-2005-3352.t
parentAdding upstream version 2.4.57. (diff)
downloadapache2-e483aacee00195ef2e2f1f5ae6277e6e8a5e6d62.tar.xz
apache2-e483aacee00195ef2e2f1f5ae6277e6e8a5e6d62.zip
Adding debian version 2.4.57-2.debian/2.4.57-2debian
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/perl-framework/t/security/CVE-2005-3352.t')
-rw-r--r--debian/perl-framework/t/security/CVE-2005-3352.t23
1 files changed, 23 insertions, 0 deletions
diff --git a/debian/perl-framework/t/security/CVE-2005-3352.t b/debian/perl-framework/t/security/CVE-2005-3352.t
new file mode 100644
index 0000000..b1881a9
--- /dev/null
+++ b/debian/perl-framework/t/security/CVE-2005-3352.t
@@ -0,0 +1,23 @@
+use strict;
+use warnings FATAL => 'all';
+
+use Apache::Test;
+use Apache::TestUtil;
+use Apache::TestRequest;
+
+my $vars = Apache::Test::vars();
+
+plan tests => 2, need_imagemap;
+
+my $url = "/security/CVE-2005-3352.map";
+
+my $r = GET $url, Referer => '">http://fish/';
+
+ok t_cmp($r->code, 200, "response code is OK");
+
+if ((!have_min_apache_version('2.3') && have_min_apache_version('2.2.24')) ||
+ have_min_apache_version('2.4.4')) {
+ ok t_cmp($r->content, qr/%22%3e/, "referer was escaped");
+} else {
+ ok t_cmp($r->content, qr/\&quot/, "referer was escaped");
+}