mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
Bug 341604 - tests for iframe sandbox - general r=jst
This commit is contained in:
parent
5bf4bcfbd0
commit
260965c8f7
@ -280,6 +280,18 @@ MOCHITEST_FILES = \
|
||||
file_iframe_sandbox_b_if1.html \
|
||||
file_iframe_sandbox_b_if2.html \
|
||||
file_iframe_sandbox_b_if3.html \
|
||||
test_iframe_sandbox_general.html \
|
||||
file_iframe_sandbox_c_if1.html \
|
||||
file_iframe_sandbox_c_if2.html \
|
||||
file_iframe_sandbox_c_if3.html \
|
||||
file_iframe_sandbox_c_if4.html \
|
||||
file_iframe_sandbox_c_if5.html \
|
||||
file_iframe_sandbox_c_if6.html \
|
||||
file_iframe_sandbox_form_fail.html \
|
||||
file_iframe_sandbox_form_pass.html \
|
||||
file_iframe_sandbox_open_window_fail.html \
|
||||
file_iframe_sandbox_pass.js \
|
||||
file_iframe_sandbox_fail.js \
|
||||
test_iframe_sandbox_navigation.html \
|
||||
file_iframe_sandbox_d_if1.html \
|
||||
file_iframe_sandbox_d_if2.html \
|
||||
|
35
content/html/content/test/file_iframe_sandbox_c_if1.html
Normal file
35
content/html/content/test/file_iframe_sandbox_c_if1.html
Normal file
@ -0,0 +1,35 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="text/javascript" src="/tests/SimpleTest/EventUtils.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
</head>
|
||||
<script type="text/javascript">
|
||||
function ok(result, desc) {
|
||||
window.parent.postMessage({ok: result, desc: desc}, "*");
|
||||
}
|
||||
|
||||
function doStuff() {
|
||||
ok(true, "documents sandboxed with allow-scripts should be able to run inline scripts");
|
||||
|
||||
document.getElementById('a_form').submit();
|
||||
|
||||
// trigger the javascript: url test
|
||||
sendMouseEvent({type:'click'}, 'a_link');
|
||||
}
|
||||
</script>
|
||||
<script src='file_iframe_sandbox_pass.js'></script>
|
||||
<body onLoad='ok(true, "documents sandboxed with allow-scripts should be able to run script from event listeners");doStuff();'>
|
||||
I am sandboxed but with "allow-scripts"
|
||||
|
||||
<form method="get" action="file_iframe_sandbox_form_fail.html" id="a_form">
|
||||
First name: <input type="text" name="firstname">
|
||||
Last name: <input type="text" name="lastname">
|
||||
<input type="submit" onclick="doSubmit()" id="a_button">
|
||||
</form>
|
||||
|
||||
<a href = 'javascript:ok(true, "documents sandboxed with allow-scripts should be able to run script from javascript: URLs");' id='a_link'>click me</a>
|
||||
</body>
|
||||
</html>
|
23
content/html/content/test/file_iframe_sandbox_c_if2.html
Normal file
23
content/html/content/test/file_iframe_sandbox_c_if2.html
Normal file
@ -0,0 +1,23 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
|
||||
</head>
|
||||
<script type="text/javascript">
|
||||
function ok(result, desc) {
|
||||
window.parent.postMessage({ok: result, desc: message}, "*");
|
||||
}
|
||||
|
||||
function doStuff() {
|
||||
ok(false, "documents sandboxed without allow-scripts should NOT be able to run inline scripts");
|
||||
}
|
||||
</script>
|
||||
<script src='file_iframe_sandbox_fail.js'></script>
|
||||
<body onLoad='window.parent.postmessage({ok: false, desc: "documents sandboxed without allow-scripts should NOT be able to run script from event handlers"}, "*");doStuff();'>
|
||||
I am sandboxed with no permissions
|
||||
<img src="about:blank" onerror='ok(false, "documents sandboxed without allow-scripts should NOT be able to run script from event handlers");')>
|
||||
</body>
|
||||
</html>
|
26
content/html/content/test/file_iframe_sandbox_c_if3.html
Normal file
26
content/html/content/test/file_iframe_sandbox_c_if3.html
Normal file
@ -0,0 +1,26 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="text/javascript" src="/tests/SimpleTest/EventUtils.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
|
||||
</head>
|
||||
<script type="text/javascript">
|
||||
function doStuff() {
|
||||
dump("*** c_if3 has loaded\n");
|
||||
// try and submit the form - this should succeed
|
||||
document.getElementById('a_form').submit();
|
||||
}
|
||||
</script>
|
||||
<body onLoad="doStuff()">
|
||||
I am sandboxed but with "allow-scripts allow-forms"
|
||||
|
||||
<form method="get" action="file_iframe_sandbox_form_pass.html" id="a_form">
|
||||
First name: <input type="text" name="firstname">
|
||||
Last name: <input type="text" name="lastname">
|
||||
<input type="submit" onclick="doSubmit()" id="a_button">
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
44
content/html/content/test/file_iframe_sandbox_c_if4.html
Normal file
44
content/html/content/test/file_iframe_sandbox_c_if4.html
Normal file
@ -0,0 +1,44 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="text/javascript" src="/tests/SimpleTest/EventUtils.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
|
||||
</head>
|
||||
<script type="text/javascript">
|
||||
function ok(result, desc) {
|
||||
window.parent.ok_wrapper(result, desc);
|
||||
}
|
||||
|
||||
function doStuff() {
|
||||
// try to open a new window via target="_blank", window.open(), and showModalDialog()
|
||||
// the window we try to open closes itself once it opens
|
||||
sendMouseEvent({type:'click'}, 'target_blank');
|
||||
|
||||
var threw = false;
|
||||
try {
|
||||
window.open("about:blank");
|
||||
} catch (error) {
|
||||
threw = true;
|
||||
}
|
||||
|
||||
ok(threw, "window.open threw a JS exception and was not allowed");
|
||||
|
||||
threw = false;
|
||||
try {
|
||||
window.showModalDialog("about:blank");
|
||||
} catch(error) {
|
||||
threw = true;
|
||||
}
|
||||
|
||||
ok(threw, "window.showModalDialog threw a JS exception and was not allowed");
|
||||
}
|
||||
</script>
|
||||
<body onLoad="doStuff()">
|
||||
I am sandboxed but with "allow-scripts allow-same-origin"
|
||||
|
||||
<a href="file_iframe_sandbox_open_window_fail.html" target="_blank" id="target_blank">open window</a>
|
||||
</body>
|
||||
</html>
|
20
content/html/content/test/file_iframe_sandbox_c_if5.html
Normal file
20
content/html/content/test/file_iframe_sandbox_c_if5.html
Normal file
@ -0,0 +1,20 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="text/javascript" src="/tests/SimpleTest/EventUtils.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
|
||||
</head>
|
||||
<script type="text/javascript">
|
||||
function ok(result, desc) {
|
||||
window.parent.ok_wrapper(result, desc);
|
||||
}
|
||||
</script>
|
||||
<body onLoad="doStuff()">
|
||||
I am sandboxed but with "allow-same-origin"
|
||||
|
||||
<a href = 'javascript:ok(false, "documents sandboxed without allow-scripts should not be able to run script with javascript: URLs");' id='a_link'>click me</a>
|
||||
</body>
|
||||
</html>
|
24
content/html/content/test/file_iframe_sandbox_c_if6.html
Normal file
24
content/html/content/test/file_iframe_sandbox_c_if6.html
Normal file
@ -0,0 +1,24 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="text/javascript" src="/tests/SimpleTest/EventUtils.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
|
||||
</head>
|
||||
<script type="text/javascript">
|
||||
function ok(result, desc) {
|
||||
window.parent.ok_wrapper(result, desc);
|
||||
window.parent.postMessage({ok: result, desc: desc}, "*");
|
||||
}
|
||||
|
||||
function doStuff() {
|
||||
ok(true, "a document sandboxed with allow-same-origin and allow-scripts should be same origin with its parent and able to run scripts " +
|
||||
"regardless of what kind of whitespace was used in its sandbox attribute");
|
||||
}
|
||||
</script>
|
||||
<body onLoad="doStuff()">
|
||||
I am sandboxed but with "allow-same-origin" and "allow-scripts"
|
||||
</body>
|
||||
</html>
|
1
content/html/content/test/file_iframe_sandbox_fail.js
Normal file
1
content/html/content/test/file_iframe_sandbox_fail.js
Normal file
@ -0,0 +1 @@
|
||||
ok(false, "documents sandboxed with allow-scripts should NOT be able to run <script src=...>");
|
19
content/html/content/test/file_iframe_sandbox_form_fail.html
Normal file
19
content/html/content/test/file_iframe_sandbox_form_fail.html
Normal file
@ -0,0 +1,19 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
</head>
|
||||
|
||||
<body onLoad="doStuff()">
|
||||
I should NOT be loaded by a form submit from a sandbox without 'allow-forms'
|
||||
</body>
|
||||
</html>
|
||||
|
||||
<script>
|
||||
function doStuff() {
|
||||
window.parent.postMessage({ok: false, desc: "documents sandboxed without allow-forms should NOT be able to submit forms"}, "*");
|
||||
}
|
||||
</script>
|
19
content/html/content/test/file_iframe_sandbox_form_pass.html
Normal file
19
content/html/content/test/file_iframe_sandbox_form_pass.html
Normal file
@ -0,0 +1,19 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
</head>
|
||||
|
||||
<body onLoad="doStuff()">
|
||||
I should be loaded by a form submit from a sandbox with 'allow-forms'
|
||||
</body>
|
||||
</html>
|
||||
|
||||
<script>
|
||||
function doStuff() {
|
||||
window.parent.postMessage({ok: true, desc: "documents sandboxed with allow-forms should be able to submit forms"}, "*");
|
||||
}
|
||||
</script>
|
@ -0,0 +1,21 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
</head>
|
||||
|
||||
<body onLoad="doStuff()">
|
||||
I should NOT be opened by a sandboxed iframe via any method
|
||||
</body>
|
||||
</html>
|
||||
|
||||
<script>
|
||||
function doStuff() {
|
||||
console.log("file_iframe_sandbox_window_open_fail.html");
|
||||
window.opener.ok(false, "sandboxed documents should NOT be able to open windows");
|
||||
self.close();
|
||||
}
|
||||
</script>
|
1
content/html/content/test/file_iframe_sandbox_pass.js
Normal file
1
content/html/content/test/file_iframe_sandbox_pass.js
Normal file
@ -0,0 +1 @@
|
||||
ok(true, "documents sandboxed with allow-scripts should be able to run <script src=...>");
|
221
content/html/content/test/test_iframe_sandbox_general.html
Normal file
221
content/html/content/test/test_iframe_sandbox_general.html
Normal file
@ -0,0 +1,221 @@
|
||||
<!DOCTYPE HTML>
|
||||
<html>
|
||||
<!--
|
||||
https://bugzilla.mozilla.org/show_bug.cgi?id=341604
|
||||
Implement HTML5 sandbox attribute for IFRAMEs - general tests
|
||||
-->
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>Test for Bug 341604</title>
|
||||
<script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
|
||||
<script type="text/javascript" src="/tests/SimpleTest/EventUtils.js"></script>
|
||||
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
|
||||
</head>
|
||||
<script type="application/javascript">
|
||||
/** Test for Bug 341604 - Implement HTML5 sandbox attribute for IFRAMEs - general tests **/
|
||||
|
||||
SimpleTest.waitForExplicitFinish();
|
||||
|
||||
// a postMessage handler that is used by sandboxed iframes without
|
||||
// 'allow-same-origin' to communicate pass/fail back to this main page.
|
||||
// it expects to be called with an object like {ok: true/false, desc:
|
||||
// <description of the test> which it then forwards to ok()
|
||||
window.addEventListener("message", receiveMessage, false);
|
||||
|
||||
function receiveMessage(event)
|
||||
{
|
||||
ok_wrapper(event.data.ok, event.data.desc);
|
||||
}
|
||||
|
||||
var completedTests = 0;
|
||||
var passedTests = 0;
|
||||
|
||||
function ok_wrapper(result, desc) {
|
||||
ok(result, desc);
|
||||
|
||||
completedTests++;
|
||||
|
||||
if (result) {
|
||||
passedTests++;
|
||||
}
|
||||
|
||||
if (completedTests == 21) {
|
||||
is(passedTests, 21, "There are 21 general tests that should pass");
|
||||
SimpleTest.finish();
|
||||
}
|
||||
}
|
||||
|
||||
function doTest() {
|
||||
// passes if good
|
||||
// 1) test that inline scripts (<script>) can run in an iframe sandboxed with "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if1.html which has 'allow-scripts')
|
||||
|
||||
// passes if good
|
||||
// 2) test that <script src=...> can run in an iframe sandboxed with "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if1.html which has 'allow-scripts')
|
||||
|
||||
// passes if good
|
||||
// 3) test that script in an event listener (body onload) can run in an iframe sandboxed with "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if1.html which has 'allow-scripts')
|
||||
|
||||
// passes if good
|
||||
// 4) test that script in an javascript:url can run in an iframe sandboxed with "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if1.html which has 'allow-scripts')
|
||||
|
||||
// fails if bad
|
||||
// 5) test that inline scripts cannot run in an iframe sandboxed without "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if2.html which has sandbox='')
|
||||
|
||||
// fails if bad
|
||||
// 6) test that <script src=...> cannot run in an iframe sandboxed without "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if2.html which has sandbox='')
|
||||
|
||||
// fails if bad
|
||||
// 7) test that script in an event listener (body onload) cannot run in an iframe sandboxed without "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if2.html which has sandbox='')
|
||||
|
||||
// fails if bad
|
||||
// 8) test that script in an event listener (img onerror) cannot run in an iframe sandboxed without "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if2.html which has sandbox='')
|
||||
|
||||
// fails if bad
|
||||
// 9) test that script in an javascript:url cannot run in an iframe sandboxed without "allow-scripts"
|
||||
// (done in file_iframe_sandbox_c_if_5.html which has sandbox='allow-same-origin')
|
||||
var if_w = document.getElementById('if_5').contentWindow;
|
||||
sendMouseEvent({type:'click'}, 'a_link', if_w);
|
||||
|
||||
// passes if good
|
||||
// 10) test that a new iframe has sandbox attribute
|
||||
var ifr = document.createElement("iframe");
|
||||
ok_wrapper("sandbox" in ifr, "a new iframe should have a sandbox attribute");
|
||||
|
||||
// passes if good
|
||||
// 11) test that the sandbox attribute's default value is an empty string
|
||||
ok_wrapper(ifr.sandbox === "", "default sandbox attribute should be an empty string");
|
||||
|
||||
// passes if good
|
||||
// 12) test that a sandboxed iframe with 'allow-forms' can submit forms
|
||||
// (done in file_iframe_sandbox_c_if3.html which has 'allow-forms' and 'allow-scripts')
|
||||
|
||||
// fails if bad
|
||||
// 13) test that a sandboxed iframe without 'allow-forms' can NOT submit forms
|
||||
// (done in file_iframe_sandbox_c_if1.html which only has 'allow-scripts')
|
||||
|
||||
// fails if bad
|
||||
// 14) test that a sandboxed iframe can't open a new window using the target.attribute
|
||||
// this is done via file_iframe_sandbox_c_if4.html which is sandboxed with "allow-scripts" and "allow-same-origin"
|
||||
// the window it attempts to open calls window.opener.ok(false, ...) and file_iframe_c_if4.html has an ok()
|
||||
// function that calls window.parent.ok_wrapper
|
||||
|
||||
// passes if good
|
||||
// 15) test that a sandboxed iframe can't open a new window using window.open
|
||||
// this is done via file_iframe_sandbox_c_if4.html which is sandboxed with "allow-scripts" and "allow-same-origin"
|
||||
// the window it attempts to open calls window.opener.ok(false, ...) and file_iframe_c_if4.html has an ok()
|
||||
// function that calls window.parent.ok_wrapper
|
||||
|
||||
// passes if good
|
||||
// 16) test that a sandboxed iframe can't open a new window using window.ShowModalDialog
|
||||
// this is done via file_iframe_sandbox_c_if4.html which is sandboxed with "allow-scripts" and "allow-same-origin"
|
||||
// the window it attempts to open calls window.opener.ok(false, ...) and file_iframe_c_if4.html has an ok()
|
||||
// function that calls window.parent.ok_wrapper
|
||||
|
||||
// passes twice if good
|
||||
// 17) test that a sandboxed iframe can access same-origin documents and run scripts when its sandbox attribute
|
||||
// is separated with two spaces
|
||||
// done via file_iframe_sandbox_c_if6.html which is sandboxed with " allow-scripts allow-same-origin "
|
||||
|
||||
// passes twice if good
|
||||
// 18) test that a sandboxed iframe can access same-origin documents and run scripts when its sandbox attribute
|
||||
// is separated with tabs
|
||||
// done via file_iframe_sandbox_c_if6.html which is sandboxed with "	allow-scripts	allow-same-origin	"
|
||||
|
||||
// passes twice if good
|
||||
// 19) test that a sandboxed iframe can access same-origin documents and run scripts when its sandbox attribute
|
||||
// is separated with line feeds
|
||||
// done via file_iframe_sandbox_c_if6.html which is sandboxed with "
allow-scripts
allow-same-origin
"
|
||||
|
||||
// passes twice if good
|
||||
// 20) test that a sandboxed iframe can access same-origin documents and run scripts when its sandbox attribute
|
||||
// is separated with form feeds
|
||||
// done via file_iframe_sandbox_c_if6.html which is sandboxed with "allow-scriptsallow-same-origin"
|
||||
|
||||
// passes twice if good
|
||||
// 21) test that a sandboxed iframe can access same-origin documents and run scripts when its sandbox attribute
|
||||
// is separated with carriage returns
|
||||
// done via file_iframe_sandbox_c_if6.html which is sandboxed with "
allow-scripts
allow-same-origin
"
|
||||
|
||||
// fails if bad
|
||||
// 22) test that an iframe with sandbox="" does NOT have script in a src attribute created by a javascript:
|
||||
// URL executed
|
||||
// done by this page, see if_7
|
||||
|
||||
// passes if good
|
||||
// 23) test that an iframe with sandbox="allow-scripts" DOES have script in a src attribute created by a javascript:
|
||||
// URL executed
|
||||
// done by this page, see if_8
|
||||
|
||||
// fails if bad
|
||||
// 24) test that an iframe with sandbox="", starting out with a document already loaded, does NOT have script in a newly
|
||||
// set src attribute created by a javascript: URL executed
|
||||
// done by this page, see if_9
|
||||
|
||||
// passes if good
|
||||
// 25) test that an iframe with sandbox="allow-scripts", starting out with a document already loaded, DOES have script
|
||||
// in a newly set src attribute created by a javascript: URL executed
|
||||
// done by this page, see if_10
|
||||
}
|
||||
|
||||
addLoadEvent(doTest);
|
||||
|
||||
var started_if_9 = false;
|
||||
var started_if_10 = false;
|
||||
|
||||
function start_if_9() {
|
||||
if (started_if_9)
|
||||
return;
|
||||
|
||||
started_if_9 = true;
|
||||
sendMouseEvent({type:'click'}, 'a_button');
|
||||
}
|
||||
|
||||
function start_if_10() {
|
||||
if (started_if_10)
|
||||
return;
|
||||
|
||||
started_if_10 = true;
|
||||
sendMouseEvent({type:'click'}, 'a_button2');
|
||||
}
|
||||
|
||||
function do_if_9() {
|
||||
var if_9 = document.getElementById('if_9');
|
||||
if_9.src = 'javascript:"<html><script>window.parent.ok_wrapper(false, \'an iframe sandboxed without allow-scripts should not execute script in a javascript URL in a newly set src attribute\');<\/script><\/html>"';
|
||||
}
|
||||
|
||||
function do_if_10() {
|
||||
var if_10 = document.getElementById('if_10');
|
||||
if_10.src = 'javascript:"<html><script>window.parent.ok_wrapper(true, \'an iframe sandboxed with allow-scripts should execute script in a javascript URL in a newly set src attribute\');<\/script><\/html>"';
|
||||
}
|
||||
</script>
|
||||
<body>
|
||||
<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=341604">Mozilla Bug 341604</a> - Implement HTML5 sandbox attribute for IFRAMEs
|
||||
<p id="display"></p>
|
||||
<div id="content">
|
||||
<iframe sandbox="allow-same-origin allow-scripts" id="if_1" src="file_iframe_sandbox_c_if1.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="" id="if_2" src="file_iframe_sandbox_c_if2.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="allow-forms allow-scripts" id="if_3" src="file_iframe_sandbox_c_if3.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="allow-same-origin allow-scripts" id="if_4" src="file_iframe_sandbox_c_if4.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="allow-same-origin" id="if_5" src="file_iframe_sandbox_c_if5.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox=" allow-same-origin allow-scripts " id="if_6_a" src="file_iframe_sandbox_c_if6.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="	allow-same-origin	allow-scripts	" id="if_6_b" src="file_iframe_sandbox_c_if6.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="
allow-same-origin
allow-scripts
" id="if_6_c" src="file_iframe_sandbox_c_if6.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="allow-same-originallow-scripts" id="if_6_d" src="file_iframe_sandbox_c_if6.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="
allow-same-origin
allow-scripts
" id="if_6_e" src="file_iframe_sandbox_c_if6.html" height="10" width="10"></iframe>
|
||||
<iframe sandbox="allow-same-origin" id='if_7' src="javascript:'<html><script>window.parent.ok_wrapper(false, \'an iframe sandboxed without allow-scripts should not execute script in a javascript URL in its src attribute\');<\/script><\/html>';" height="10" width="10"></iframe>
|
||||
<iframe sandbox="allow-same-origin allow-scripts" id='if_8' src="javascript:'<html><script>window.parent.ok_wrapper(true, \'an iframe sandboxed without allow-scripts should execute script in a javascript URL in its src attribute\');<\/script><\/html>';" height="10" width="10"></iframe>
|
||||
<iframe sandbox="allow-same-origin" onload='start_if_9()' id='if_9' src="about:blank" height="10" width="10"></iframe>
|
||||
<iframe sandbox="allow-same-origin allow-scripts" onload='start_if_10()' id='if_10' src="about:blank" height="10" width="10"></iframe>
|
||||
<input type='button' id="a_button" onclick='do_if_9()'>
|
||||
<input type='button' id="a_button2" onclick='do_if_10()'>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
Loading…
Reference in New Issue
Block a user