package com.google.testing.security.firingrange.tests.reverseclickjacking;
import static org.mockito.Mockito.contains;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.never;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.JUnit4;
import java.io.IOException;
import java.io.PrintWriter;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
/**
* Tests for {@link UniversalReverseClickjackingSinglePage}.
*/
@RunWith(JUnit4.class)
public class UniversalReverseClickjackingSinglePageTest {
private static final String VULNERABLE_PARAMETER = "FOO'\"=_FOO";
private static final String VULNERABLE_PARAMETER_STRIPPED = "FOO=_FOO";
private HttpServletRequest request = mock(HttpServletRequest.class);
private HttpServletResponse response = mock(HttpServletResponse.class);
private PrintWriter writer = mock(PrintWriter.class);
@Before
public void setUpMocks() throws IOException {
when(response.getWriter()).thenReturn(writer);
}
@Test
public void returnsPageParameterInQueryInCallback() throws IOException {
when(request.getPathInfo()).thenReturn("singlepage/ParameterInQuery/InCallback");
when(request.getParameter(UniversalReverseClickjackingSinglePage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingSinglePage().doGet(request, response);
verify(response).setStatus(200);
// Verify that single and double quotes are stripped, while =_ are not
verify(writer).write(contains("callback=" + VULNERABLE_PARAMETER_STRIPPED));
}
@Test
public void returnsPageParameterInQueryOtherParameter() throws IOException {
when(request.getPathInfo()).thenReturn("singlepage/ParameterInQuery/OtherParameter");
when(request.getParameter(UniversalReverseClickjackingSinglePage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingSinglePage().doGet(request, response);
verify(response).setStatus(200);
// Verify that single and double quotes are stripped, while =_ are not
verify(writer).write(contains("q=" + VULNERABLE_PARAMETER_STRIPPED));
}
@Test
public void returnsPageParameterInFragmentInCallback() throws IOException {
when(request.getPathInfo()).thenReturn("singlepage/ParameterInFragment/InCallback");
when(request.getParameter(UniversalReverseClickjackingSinglePage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingSinglePage().doGet(request, response);
verify(response).setStatus(200);
// Verify that we return the right template, with the parameter reflected correctly
verify(writer).write(contains("callback=' + q"));
}
@Test
public void returnsPageParameterInFragmentOtherParameter() throws IOException {
when(request.getPathInfo()).thenReturn("singlepage/ParameterInFragment/OtherParameter");
when(request.getParameter(UniversalReverseClickjackingSinglePage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingSinglePage().doGet(request, response);
verify(response).setStatus(200);
// Verify that we return the right template, with the parameter reflected correctly
verify(writer).write(contains("q=' + q"));
}
@Test
public void returnsErrorOnInvalidParameterLocation() throws IOException {
when(request.getPathInfo()).thenReturn("singlepage/INVALID");
when(request.getParameter(UniversalReverseClickjackingSinglePage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingSinglePage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
@Test
public void returnsErrorOnNoParameterLocation() throws IOException {
when(request.getPathInfo()).thenReturn("singlepage");
when(request.getParameter(UniversalReverseClickjackingSinglePage.VULNERABLE_PARAMETER))
.thenReturn(VULNERABLE_PARAMETER);
new UniversalReverseClickjackingSinglePage().doGet(request, response);
verify(response).setStatus(400);
// Verify that we don't return a template
verify(writer, never()).write(contains("<html>"));
}
}