########################################################################## # # pgAdmin 4 - PostgreSQL Tools # # Copyright (C) 2013 - 2018, The pgAdmin Development Team # This software is released under the PostgreSQL Licence # ########################################################################## from regression.python_test_utils import test_utils from regression.feature_utils.base_feature_test import BaseFeatureTest class CheckRoleMembershipControlFeatureTest(BaseFeatureTest): """Tests to check role membership control for xss.""" scenarios = [ ("Tests to check if Role membership control is vulnerable to XSS", dict()) ] def before(self): with test_utils.Database(self.server) as (connection, _): if connection.server_version < 90100: self.skipTest( "Membership is not present in Postgres below PG v9.1") # Some test function is needed for debugger test_utils.create_role(self.server, "postgres", "test_role") test_utils.create_role(self.server, "postgres", "

test

") def runTest(self): self.page.wait_for_spinner_to_disappear() self.page.add_server(self.server) self._role_node_expandable() self._check_role_membership_control() def after(self): self.page.remove_server(self.server) test_utils.drop_role(self.server, "postgres", "test_role") test_utils.drop_role(self.server, "postgres", "

test

") def _role_node_expandable(self): self.page.toggle_open_server(self.server['name']) self.page.toggle_open_tree_item('Login/Group Roles') self.page.select_tree_item("test_role") def _check_role_membership_control(self): self.page.driver.find_element_by_link_text("Object").click() self.page.driver.find_element_by_link_text("Properties...").click() self.page.find_by_partial_link_text("Membership").click() # Fetch the source code for our custom control source_code = self.page.find_by_xpath( "//div[contains(@class,'rolmembership')]" ).get_attribute('innerHTML') self._check_escaped_characters( source_code, '<h1>test</h1>', 'Role Membership Control' ) self.page.find_by_xpath( "//button[contains(@type, 'cancel') and " "contains(.,'Cancel')]" ).click() def _check_escaped_characters(self, source_code, string_to_find, source): # For XSS we need to search against element's html code assert source_code.find(string_to_find) != - \ 1, "{0} might be vulnerable to XSS ".format(source)