<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>[Tests][1010] trunk/tests/kses.php: Kses unit tests.</title>
</head>
<body>
<style type="text/css"><!--
#msg dl.meta { border: 1px #006 solid; background: #369; padding: 6px; color: #fff; }
#msg dl.meta dt { float: left; width: 6em; font-weight: bold; }
#msg dt:after { content:':';}
#msg dl, #msg dt, #msg ul, #msg li, #header, #footer, #logmsg { font-family: verdana,arial,helvetica,sans-serif; font-size: 10pt; }
#msg dl a { font-weight: bold}
#msg dl a:link { color:#fc3; }
#msg dl a:active { color:#ff0; }
#msg dl a:visited { color:#cc6; }
h3 { font-family: verdana,arial,helvetica,sans-serif; font-size: 10pt; font-weight: bold; }
#msg pre { overflow: auto; background: #ffc; border: 1px #fa0 solid; padding: 6px; }
#logmsg { background: #ffc; border: 1px #fa0 solid; padding: 1em 1em 0 1em; }
#logmsg p, #logmsg pre, #logmsg blockquote { margin: 0 0 1em 0; }
#logmsg p, #logmsg li, #logmsg dt, #logmsg dd { line-height: 14pt; }
#logmsg h1, #logmsg h2, #logmsg h3, #logmsg h4, #logmsg h5, #logmsg h6 { margin: .5em 0; }
#logmsg h1:first-child, #logmsg h2:first-child, #logmsg h3:first-child, #logmsg h4:first-child, #logmsg h5:first-child, #logmsg h6:first-child { margin-top: 0; }
#logmsg ul, #logmsg ol { padding: 0; list-style-position: inside; margin: 0 0 0 1em; }
#logmsg > ul, #logmsg > ol { margin-left: 0; margin: 0 0 1em 0; }
#logmsg pre { background: #eee; padding: 1em; }
#logmsg blockquote { border: 1px solid #fa0; border-left-width: 10px; padding: 1em 1em 0 1em; background: white;}
#logmsg dl { margin: 0; }
#logmsg dt { font-weight: bold; }
#logmsg dd { margin: 0; padding: 0 0 0.5em 0; }
#logmsg dd:before { content:'\00bb';}
#logmsg table { border-spacing: 0px; border-collapse: collapse; border-top: 4px solid #fa0; border-bottom: 1px solid #fa0; background: #fff; }
#logmsg table th { text-align: left; font-weight: normal; padding: 0.2em 0.5em; border-top: 1px dotted #fa0; }
#logmsg table td { text-align: right; border-top: 1px dotted #fa0; padding: 0.2em 0.5em; }
#logmsg table thead th { text-align: center; border-bottom: 1px solid #fa0; }
#logmsg table th.Corner { text-align: left; }
#logmsg hr { border: none 0; border-top: 2px dashed #fa0; height: 1px; }
#header, #footer { color: #fff; background: #636; border: 1px #300 solid; padding: 6px; }
#patch { width: 100%; }
#patch h4 {font-family: verdana,arial,helvetica,sans-serif;font-size:10pt;padding:8px;background:#369;color:#fff;margin:0;}
#patch .propset h4, #patch .binary h4 {margin:0;}
#patch pre {padding:0;line-height:1.2em;margin:0;}
#patch .diff {width:100%;background:#eee;padding: 0 0 10px 0;overflow:auto;}
#patch .propset .diff, #patch .binary .diff {padding:10px 0;}
#patch span {display:block;padding:0 10px;}
#patch .modfile, #patch .addfile, #patch .delfile, #patch .propset, #patch .binary, #patch .copfile {border:1px solid #ccc;margin:10px 0;}
#patch ins {background:#dfd;text-decoration:none;display:block;padding:0 10px;}
#patch del {background:#fdd;text-decoration:none;display:block;padding:0 10px;}
#patch .lines, .info {color:#888;background:#fff;}
--></style>
<div id="msg">
<dl class="meta">
<dt>Revision</dt> <dd><a href="http://unit-tests.trac.wordpress.org/changeset/1010">1010</a></dd>
<dt>Author</dt> <dd>ryan</dd>
<dt>Date</dt> <dd>2012-09-07 20:11:29 +0000 (Fri, 07 Sep 2012)</dd>
</dl>
<h3>Log Message</h3>
<pre>Kses unit tests. Props duck_</pre>
<h3>Modified Paths</h3>
<ul>
<li><a href="#trunktestsksesphp">trunk/tests/kses.php</a></li>
</ul>
</div>
<div id="patch">
<h3>Diff</h3>
<a id="trunktestsksesphp"></a>
<div class="modfile"><h4>Modified: trunk/tests/kses.php (1009 => 1010)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/tests/kses.php        2012-09-05 20:12:41 UTC (rev 1009)
+++ trunk/tests/kses.php        2012-09-07 20:11:29 UTC (rev 1010)
</span><span class="lines">@@ -100,6 +100,199 @@
</span><span class="cx"> <a href="">CLICK ME</a>
</span><span class="cx"> EOF;
</span><span class="cx">
</span><del>-        $this->assertEquals( $expected, wp_kses( $content, $allowedposttags ) );
</del><ins>+                $this->assertEquals( $expected, wp_kses( $content, $allowedposttags ) );
</ins><span class="cx">         }
</span><ins>+
+        function test_wp_kses_bad_protocol() {
+                $bad = array(
+                        'dummy:alert(1)',
+                        'javascript:alert(1)',
+                        'JaVaScRiPt:alert(1)',
+                        'javascript:alert(1);',
+                        'javascript&#58;alert(1);',
+                        'javascript&#0058;alert(1);',
+                        'javascript&#0000058alert(1);',
+                        'javascript&#x3A;alert(1);',
+                        'javascript&#X3A;alert(1);',
+                        'javascript&#X3a;alert(1);',
+                        'javascript&#x3a;alert(1);',
+                        'javascript&#x003a;alert(1);',
+                        '&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29',
+                        'jav        ascript:alert(1);',
+                        'jav&#x09;ascript:alert(1);',
+                        'jav&#x0A;ascript:alert(1);',
+                        'jav&#x0D;ascript:alert(1);',
+                        ' &#14; javascript:alert(1);',
+                        'javascript:javascript:alert(1);',
+                        'javascript&#58;javascript:alert(1);',
+                        'javascript&#0000058javascript:alert(1);',
+                        'javascript:javascript&#58;alert(1);',
+                        'javascript:javascript&#0000058alert(1);',
+                        'javascript&#0000058alert(1)//?:',
+                        'feed:javascript:alert(1)',
+                        'feed:javascript:feed:javascript:feed:javascript:alert(1)',
+                );
+                foreach ( $bad as $k => $x ) {
+                        $result = wp_kses_bad_protocol( wp_kses_normalize_entities( $x ), wp_allowed_protocols() );
+                        if ( ! empty( $result ) && $result != 'alert(1);' && $result != 'alert(1)' ) {
+                                switch ( $k ) {
+                                        case 6: $this->assertEquals( 'javascript&amp;#0000058alert(1);', $result ); break;
+                                        case 12:
+                                                $this->assertEquals( str_replace( '&', '&amp;', $x ), $result );
+                                                break;
+                                        case 22: $this->assertEquals( 'javascript&amp;#0000058alert(1);', $result ); break;
+                                        case 23: $this->assertEquals( 'javascript&amp;#0000058alert(1)//?:', $result ); break;
+                                        case 24: $this->assertEquals( 'feed:alert(1)', $result ); break;
+                                        default: $this->fail( "wp_kses_bad_protocol failed on $x. Result: $result" );
+                                }
+                        }
+                }
+
+                $safe = array(
+                        'dummy:alert(1)',
+                        'HTTP://example.org/',
+                        'http://example.org/',
+                        'http&#58;//example.org/',
+                        'http&#x3A;//example.org/',
+                        'https://example.org',
+                        'http://example.org/wp-admin/post.php?post=2&amp;action=edit',
+                        'http://example.org/index.php?test=&#039;blah&#039;',
+                );
+                foreach ( $safe as $x ) {
+                        $result = wp_kses_bad_protocol( wp_kses_normalize_entities( $x ), array( 'http', 'https', 'dummy' ) );
+                        if ( $result != $x && $result != 'http://example.org/' )
+                                $this->fail( "wp_kses_bad_protocol incorrectly blocked $x" );
+                }
+        }
+
+        public function test_hackers_attacks() {
+                $xss = simplexml_load_file( DIR_TESTDATA . '/formatting/xssAttacks.xml' );
+                foreach ( $xss->attack as $attack ) {
+                        if ( in_array( $attack->name, array( 'IMG Embedded commands 2', 'US-ASCII encoding', 'OBJECT w/Flash 2', 'Character Encoding Example' ) ) )
+                                continue;
+
+                        $code = (string) $attack->code;
+
+                        if ( $code == 'See Below' )
+                                continue;
+
+                        if ( substr( $code, 0, 4 ) == 'perl' ) {
+                                $pos = strpos( $code, '"' ) + 1;
+                                $code = substr( $code, $pos, strrpos($code, '"') - $pos );
+                                $code = str_replace( '\0', "\0", $code );
+                        }
+
+                        $result = trim( wp_kses_data( $code ) );
+
+                        if ( $result == '' || $result == 'XSS' || $result == 'alert("XSS");' || $result == "alert('XSS');" )
+                                continue;
+
+                        switch ( $attack->name ) {
+                                case 'XSS Locator':
+                                        $this->assertEquals('\';alert(String.fromCharCode(88,83,83))//\\\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\\";alert(String.fromCharCode(88,83,83))//--&gt;"&gt;\'&gt;alert(String.fromCharCode(88,83,83))=', $result);
+                                        break;
+                                case 'XSS Quick Test':
+                                        $this->assertEquals('\'\';!--"=', $result);
+                                        break;
+                                case 'SCRIPT w/Alert()':
+                                        $this->assertEquals( "alert('XSS')", $result );
+                                        break;
+                                case 'SCRIPT w/Char Code':
+                                        $this->assertEquals('alert(String.fromCharCode(88,83,83))', $result);
+                                        break;
+                                case 'IMG STYLE w/expression':
+                                        $this->assertEquals('exp/*', $result);
+                                        break;
+                                case 'List-style-image':
+                                        $this->assertEquals('li {list-style-image: url("javascript:alert(\'XSS\')");}XSS', $result);
+                                        break;
+                                case 'STYLE':
+                                        $this->assertEquals( "alert('XSS');", $result);
+                                        break;
+                                case 'STYLE w/background-image':
+                                        $this->assertEquals('.XSS{background-image:url("javascript:alert(\'XSS\')");}<A></A>', $result);
+                                        break;
+                                case 'STYLE w/background':
+                                        $this->assertEquals('BODY{background:url("javascript:alert(\'XSS\')")}', $result);
+                                        break;
+                                case 'Remote Stylesheet 2':
+                                        $this->assertEquals( "@import'http://ha.ckers.org/xss.css';", $result );
+                                        break;
+                                case 'Remote Stylesheet 3':
+                                        $this->assertEquals( '&lt;META HTTP-EQUIV=&quot;Link&quot; Content=&quot;; REL=stylesheet"&gt;', $result );
+                                        break;
+                                case 'Remote Stylesheet 4':
+                                        $this->assertEquals('BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}', $result);
+                                        break;
+                                case 'XML data island w/CDATA':
+                                        $this->assertEquals( "&lt;![CDATA[]]&gt;", $result );
+                                        break;
+                                case 'XML data island w/comment':
+                                        $this->assertEquals( "<I><B>&lt;IMG SRC=&quot;javas<!-- -->cript:alert('XSS')\"&gt;</B></I>", $result );
+                                        break;
+                                case 'XML HTML+TIME':
+                                        $this->assertEquals( '&lt;t:set attributeName=&quot;innerHTML&quot; to=&quot;XSSalert(\'XSS\')"&gt;', $result );
+                                        break;
+                                case 'Commented-out Block':
+                                        $this->assertEquals( "<!--[if gte IE 4]&gt;-->\nalert('XSS');", $result );
+                                        break;
+                                case 'Cookie Manipulation':
+                                        $this->assertEquals( '&lt;META HTTP-EQUIV=&quot;Set-Cookie&quot; Content=&quot;USERID=alert(\'XSS\')"&gt;', $result );
+                                        break;
+                                case 'SSI':
+                                        $this->assertEquals( '&lt;!--#exec cmd=&quot;/bin/echo &#039;<!--#exec cmd="/bin/echo \'=http://ha.ckers.org/xss.js&gt;\'"-->', $result );
+                                        break;
+                                case 'PHP':
+                                        $this->assertEquals( '&lt;? echo(&#039;alert("XSS")\'); ?&gt;', $result );
+                                        break;
+                                case 'UTF-7 Encoding':
+                                        $this->assertEquals( '+ADw-SCRIPT+AD4-alert(\'XSS\');+ADw-/SCRIPT+AD4-', $result );
+                                        break;
+                                case 'Escaping JavaScript escapes':
+                                        $this->assertEquals('\";alert(\'XSS\');//', $result);
+                                        break;
+                                case 'STYLE w/broken up JavaScript':
+                                        $this->assertEquals( '@im\port\'\ja\vasc\ript:alert("XSS")\';', $result );
+                                        break;
+                                case 'Null Chars 2':
+                                        $this->assertEquals( '&amp;alert("XSS")', $result );
+                                        break;
+                                case 'No Closing Script Tag':
+                                        $this->assertEquals( '&lt;SCRIPT SRC=http://ha.ckers.org/xss.js', $result );
+                                        break;
+                                case 'Half-Open HTML/JavaScript':
+                                        $this->assertEquals( '&lt;IMG SRC=&quot;javascript:alert(&#039;XSS&#039;)&quot;', $result );
+                                        break;
+                                case 'Double open angle brackets':
+                                        $this->assertEquals( '&lt;IFRAME SRC=http://ha.ckers.org/scriptlet.html &lt;', $result );
+                                        break;
+                                case 'Extraneous Open Brackets':
+                                        $this->assertEquals( '&lt;alert("XSS");//&lt;', $result );
+                                        break;
+                                case 'Malformed IMG Tags':
+                                        $this->assertEquals('alert("XSS")"&gt;', $result);
+                                        break;
+                                case 'No Quotes/Semicolons':
+                                        $this->assertEquals( "a=/XSS/\nalert(a.source)", $result );
+                                        break;
+                                case 'Evade Regex Filter 1':
+                                        $this->assertEquals( '" SRC="http://ha.ckers.org/xss.js"&gt;', $result );
+                                        break;
+                                case 'Evade Regex Filter 4':
+                                        $this->assertEquals( '\'" SRC="http://ha.ckers.org/xss.js"&gt;', $result );
+                                        break;
+                                case 'Evade Regex Filter 5':
+                                        $this->assertEquals( '` SRC="http://ha.ckers.org/xss.js"&gt;', $result );
+                                        break;
+                                case 'Filter Evasion 1':
+                                        $this->assertEquals( 'document.write("&lt;SCRI&quot;);PT SRC="http://ha.ckers.org/xss.js"&gt;', $result );
+                                        break;
+                                case 'Filter Evasion 2':
+                                        $this->assertEquals( '\'&gt;" SRC="http://ha.ckers.org/xss.js"&gt;', $result );
+                                        break;
+                                default:
+                                        $this->fail( 'KSES failed on ' . $attack->name . ': ' . $result );
+                        }
+                }
+        }
</ins><span class="cx"> }
</span></span></pre>
</div>
</div>
</body>
</html>