Skip to content

Commit d7b0f62

Browse files
committed
add test
1 parent ae805eb commit d7b0f62

File tree

2 files changed

+30
-0
lines changed

2 files changed

+30
-0
lines changed

javascript/ql/test/query-tests/Security/CWE-079/DomBasedXss/XssWithAdditionalSources.expected

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -716,6 +716,13 @@ nodes
716716
| winjs.js:3:43:3:49 | tainted |
717717
| winjs.js:4:43:4:49 | tainted |
718718
| winjs.js:4:43:4:49 | tainted |
719+
| xmlRequest.js:8:13:8:47 | json |
720+
| xmlRequest.js:8:20:8:47 | JSON.pa ... seText) |
721+
| xmlRequest.js:8:31:8:46 | xhr.responseText |
722+
| xmlRequest.js:8:31:8:46 | xhr.responseText |
723+
| xmlRequest.js:9:28:9:31 | json |
724+
| xmlRequest.js:9:28:9:39 | json.message |
725+
| xmlRequest.js:9:28:9:39 | json.message |
719726
edges
720727
| addEventListener.js:1:43:1:47 | event | addEventListener.js:2:20:2:24 | event |
721728
| addEventListener.js:1:43:1:47 | event | addEventListener.js:2:20:2:24 | event |
@@ -1335,6 +1342,13 @@ edges
13351342
| winjs.js:2:17:2:33 | document.location | winjs.js:2:17:2:40 | documen ... .search |
13361343
| winjs.js:2:17:2:40 | documen ... .search | winjs.js:2:17:2:53 | documen ... ring(1) |
13371344
| winjs.js:2:17:2:53 | documen ... ring(1) | winjs.js:2:7:2:53 | tainted |
1345+
| xmlRequest.js:8:13:8:47 | json | xmlRequest.js:9:28:9:31 | json |
1346+
| xmlRequest.js:8:20:8:47 | JSON.pa ... seText) | xmlRequest.js:8:13:8:47 | json |
1347+
| xmlRequest.js:8:31:8:46 | xhr.responseText | xmlRequest.js:8:20:8:47 | JSON.pa ... seText) |
1348+
| xmlRequest.js:8:31:8:46 | xhr.responseText | xmlRequest.js:8:20:8:47 | JSON.pa ... seText) |
1349+
| xmlRequest.js:9:28:9:31 | json | xmlRequest.js:9:28:9:39 | json.message |
1350+
| xmlRequest.js:9:28:9:31 | json | xmlRequest.js:9:28:9:39 | json.message |
13381351
#select
13391352
| jwt.js:6:14:6:20 | decoded | jwt.js:4:36:4:39 | data | jwt.js:6:14:6:20 | decoded | Cross-site scripting vulnerability due to $@. | jwt.js:4:36:4:39 | data | user-provided value |
13401353
| typeahead.js:10:16:10:18 | loc | typeahead.js:9:28:9:30 | loc | typeahead.js:10:16:10:18 | loc | Cross-site scripting vulnerability due to $@. | typeahead.js:9:28:9:30 | loc | user-provided value |
1354+
| xmlRequest.js:9:28:9:39 | json.message | xmlRequest.js:8:31:8:46 | xhr.responseText | xmlRequest.js:9:28:9:39 | json.message | Cross-site scripting vulnerability due to $@. | xmlRequest.js:8:31:8:46 | xhr.responseText | user-provided value |
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
$(document).ready(function () {
2+
var xhr = new XMLHttpRequest();
3+
var url = "{{ some_url }}"
4+
xhr.open("GET", url, true)
5+
xhr.setRequestHeader("Content-Type", "application/json")
6+
xhr.onreadystatechange = function () {
7+
if (xhr.readyState !== 4) { return }
8+
var json = JSON.parse(xhr.responseText)
9+
$("#myThing").html(json.message);
10+
}
11+
try {
12+
xhr.send()
13+
} catch (error) {
14+
console.log(error)
15+
}
16+
})

0 commit comments

Comments
 (0)