package com.google.testing.security.firingrange.tests.reverseclickjacking;
import static org.mockito.Matchers.contains;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.never;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
import com.google.common.net.HttpHeaders;
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.JUnit4;
import java.io.IOException;
import java.io.PrintWriter;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
/**
* Tests for {@link UniversalReverseClickjackingMultiPage}.
*/
@RunWith(JUnit4.class)
public class UniversalReverseClickjackingMultiPageTest {
private static final String VULNERABLE_PARAMETER = "FOO'\"=_FOO";
private static final String VULNERABLE_PARAMETER_STRIPPED = "FOO=_FOO";
private HttpServletRequest request = mock(HttpServletRequest.class);
private HttpServletResponse response = mock(HttpServletResponse.class);
private PrintWriter writer = mock(PrintWriter.class);
@Before
public void setUpMocks() throws IOException {
when(response.getWriter()).thenReturn(writer);
}
@Test
public void returnsPageParameterInQueryInCallbackXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInQuery/InCallback/WithXFO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(200);
// Verify that the X_FRAME_OPTIONS header is set to DENY
verify(response).setHeader(HttpHeaders.X_FRAME_OPTIONS, "DENY");
// Verify that single and double quotes are stripped, while =_ are not
verify(writer).write(contains("callback=" + VULNERABLE_PARAMETER_STRIPPED));
}
@Test
public void returnsPageParameterInQueryOtherParameterXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInQuery/OtherParameter/WithXFO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(200);
// Verify that the X_FRAME_OPTIONS header is set to DENY
verify(response).setHeader(HttpHeaders.X_FRAME_OPTIONS, "DENY");
// Verify that single and double quotes are stripped, while =_ are not
verify(writer).write(contains("q=" + VULNERABLE_PARAMETER_STRIPPED));
}
@Test
public void returnsPageParameterInQueryInCallbackNoXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInQuery/InCallback/WithoutXFO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(200);
// Verify that the X_FRAME_OPTIONS header is NOT set to DENY
verify(response, never()).setHeader(HttpHeaders.X_FRAME_OPTIONS, "DENY");
// Verify that single and double quotes are stripped, while =_ are not
verify(writer).write(contains("callback=" + VULNERABLE_PARAMETER_STRIPPED));
}
@Test
public void returnsPageParameterInQueryOtherParameterNoXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInQuery/OtherParameter/WithoutXFO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(200);
// Verify that the X_FRAME_OPTIONS header is NOT set to DENY
verify(response, never()).setHeader(HttpHeaders.X_FRAME_OPTIONS, "DENY");
// Verify that single and double quotes are stripped, while =_ are not
verify(writer).write(contains("q=" + VULNERABLE_PARAMETER_STRIPPED));
}
@Test
public void returnsPageParameterInFragmentInCallbackXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInFragment/InCallback/WithXFO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(200);
// Verify that the X_FRAME_OPTIONS header is set to DENY
verify(response).setHeader(HttpHeaders.X_FRAME_OPTIONS, "DENY");
// Verify that we return the right template
verify(writer).write(contains("callback=' + q"));
}
@Test
public void returnsPageParameterInFragmentOtherParameterXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInFragment/OtherParameter/WithXFO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(200);
// Verify that the X_FRAME_OPTIONS header is set to DENY
verify(response).setHeader(HttpHeaders.X_FRAME_OPTIONS, "DENY");
// Verify that we return the right template
verify(writer).write(contains("q=' + q"));
}
@Test
public void returnsPageParameterInFragmentInCallbackNoXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInFragment/InCallback/WithoutXFO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(200);
// Verify that the X_FRAME_OPTIONS header is not set to DENY
verify(response, never()).setHeader(HttpHeaders.X_FRAME_OPTIONS, "DENY");
// Verify that we return the right template
verify(writer).write(contains("callback=' + q"));
}
@Test
public void returnsPageParameterInFragmentOtherParameterNoXFO() throws IOException {
when(request.getPathInfo())
.thenReturn("multipage/ParameterInFragment/OtherParameter/WithoutXFO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(200);
// Verify that the X_FRAME_OPTIONS header is not set to DENY
verify(response, never()).setHeader(HttpHeaders.X_FRAME_OPTIONS, "DENY");
// Verify that we return the right template
verify(writer).write(contains("q=' + q"));
}
@Test
public void returnsErrorOnInvalidParameterLocation() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/FOO");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
@Test
public void returnsErrorOnNoParameterLocation() throws IOException {
when(request.getPathInfo()).thenReturn("multipage");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
@Test
public void returnsErrorOnParameterInQueryInCallbackInvalidXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInQuery/InCallback/INVALID");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
@Test
public void returnsErrorOnParameterInQueryOtherParamterInvalidXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInQuery/OtherParameter/INVALID");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
@Test
public void returnsErrorOnParameterInQueryNoXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInQuery");
when(request.getParameter(UniversalReverseClickjackingMultiPage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
@Test
public void returnsErrorOnParameterInFragmentInCallbackInvalidXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInFragment/InCallback/INVALID");
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
@Test
public void returnsErrorOnParameterInFragmentOtherParameterInvalidXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInFragment/OtherParameter/INVALID");
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
@Test
public void returnsErrorOnParameterInFragmentNoXFO() throws IOException {
when(request.getPathInfo()).thenReturn("multipage/ParameterInFragment");
new UniversalReverseClickjackingMultiPage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
}