summaryrefslogtreecommitdiffstats
path: root/docshell/test/browser/browser_bug441169.js
blob: 09e83b040c44c46e01925dce8de2f42e6bd946e3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
/* Make sure that netError won't allow HTML injection through badcert parameters.  See bug 441169. */
var newBrowser;

function task() {
  let resolve;
  let promise = new Promise(r => {
    resolve = r;
  });

  addEventListener("DOMContentLoaded", checkPage, false);

  function checkPage(event) {
    if (event.target != content.document) {
      return;
    }
    removeEventListener("DOMContentLoaded", checkPage, false);

    is(
      content.document.getElementById("test_span"),
      null,
      "Error message should not be parsed as HTML, and hence shouldn't include the 'test_span' element."
    );
    resolve();
  }

  var chromeURL =
    "about:neterror?e=nssBadCert&u=https%3A//test.kuix.de/&c=UTF-8&d=This%20sentence%20should%20not%20be%20parsed%20to%20include%20a%20%3Cspan%20id=%22test_span%22%3Enamed%3C/span%3E%20span%20tag.%0A%0AThe%20certificate%20is%20only%20valid%20for%20%3Ca%20id=%22cert_domain_link%22%20title=%22kuix.de%22%3Ekuix.de%3C/a%3E%0A%0A(Error%20code%3A%20ssl_error_bad_cert_domain)";
  content.location = chromeURL;

  return promise;
}

function test() {
  waitForExplicitFinish();

  var newTab = BrowserTestUtils.addTab(gBrowser);
  gBrowser.selectedTab = newTab;
  newBrowser = gBrowser.getBrowserForTab(newTab);

  ContentTask.spawn(newBrowser, null, task).then(() => {
    gBrowser.removeCurrentTab();
    finish();
  });
}