pgadmin4/web/regression/feature_tests/xss_checks_roles_control_test.py

105 lines
3.9 KiB
Python
Raw Normal View History

##########################################################################
#
# pgAdmin 4 - PostgreSQL Tools
#
2023-01-02 00:23:55 -06:00
# Copyright (C) 2013 - 2023, The pgAdmin Development Team
# This software is released under the PostgreSQL Licence
#
##########################################################################
import secrets
from regression.python_test_utils import test_utils
from regression.feature_utils.base_feature_test import BaseFeatureTest
from regression.feature_utils.locators import NavMenuLocators
from regression.feature_utils.tree_area_locators import TreeAreaLocators
from selenium.webdriver.common.by import By
from selenium.webdriver.support import expected_conditions as EC
from selenium.webdriver.support.ui import WebDriverWait
2017-08-29 08:57:56 -05:00
class CheckRoleMembershipControlFeatureTest(BaseFeatureTest):
"""Tests to check role membership control for xss."""
scenarios = [
("Tests to check if Role membership control is vulnerable to XSS",
dict())
]
2019-04-05 01:55:03 -05:00
role = ""
2022-08-30 03:51:33 -05:00
xss_test_role = "<h1>test</h1>"
2019-04-05 02:23:50 -05:00
def before(self):
2019-04-05 01:55:03 -05:00
# create role
self.role = "test_role" + str(secrets.choice(range(10000, 65535)))
2019-04-05 01:55:03 -05:00
# Some test function is needed for debugger
test_utils.create_role(self.server, "postgres",
2019-04-05 01:55:03 -05:00
self.role)
2022-08-30 03:51:33 -05:00
test_utils.create_role(self.server, "postgres", self.xss_test_role)
test_utils.grant_role(self.server, "postgres",
2022-08-30 03:51:33 -05:00
self.role, self.xss_test_role)
self.wait = WebDriverWait(self.page.driver, 20)
def runTest(self):
self.page.wait_for_spinner_to_disappear()
self.page.add_server(self.server)
2019-04-05 01:55:03 -05:00
self._role_node_expandable(self.role)
self._check_role_membership_control()
def after(self):
self.page.remove_server(self.server)
test_utils.drop_role(self.server, "postgres",
2019-04-05 01:55:03 -05:00
self.role)
test_utils.drop_role(self.server, "postgres", self.xss_test_role)
2019-04-05 01:55:03 -05:00
def _role_node_expandable(self, role):
retry = 2
while retry > 0:
if self.page.expand_server_child_node(
"Server", self.server['name'], self.server['db_password'],
'Login/Group Roles'):
retry = 0
else:
retry -= 1
role_node = self.page.check_if_element_exists_with_scroll(
TreeAreaLocators.role_node(role))
role_node.click()
def _check_role_membership_control(self):
self.page.driver.find_element(
By.CSS_SELECTOR, NavMenuLocators.object_menu_css).click()
edit_object = self.wait.until(EC.visibility_of_element_located(
(By.CSS_SELECTOR, NavMenuLocators.edit_obj_css)))
edit_object.click()
membership_tab = WebDriverWait(self.page.driver, 4).until(
EC.presence_of_element_located((
By.XPATH, "//span[normalize-space(text())='Membership']")))
membership_tab.click()
# Fetch the source code for our custom control
source_code = self.page.find_by_xpath(
"//span[contains(@class,'icon-')]/following-sibling::span"
2021-11-18 05:43:32 -06:00
).get_attribute('innerHTML')
self._check_escaped_characters(
source_code,
'&lt;h1&gt;test&lt;/h1&gt;',
'Role Membership Control'
)
self.page.find_by_xpath("//button/span[text()='Close']").click()
def _check_escaped_characters(self, source_code, string_to_find, source):
# For XSS we need to search against element's html code
assert source_code.find(string_to_find) != - \
1, "{0} might be vulnerable to XSS ".format(source)
2019-05-23 03:31:52 -05:00
def click_membership_tab(self):
"""This will click and open membership tab of role"""
self.page.retry_click(
(By.LINK_TEXT,
"Membership"),
(By.XPATH, "//input[@placeholder='Select members']"))