You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
136 lines
5.5 KiB
PHP
136 lines
5.5 KiB
PHP
<?php
|
|
|
|
/**
|
|
* Test class to test steps/mail/func.inc functions
|
|
*
|
|
* @package Tests
|
|
*/
|
|
class rcube_test_mailfunc extends UnitTestCase
|
|
{
|
|
|
|
function __construct()
|
|
{
|
|
$this->UnitTestCase('Mail body rendering tests');
|
|
|
|
// simulate environment to successfully include func.inc
|
|
$GLOBALS['RCMAIL'] = $RCMAIL = rcmail::get_instance();
|
|
$GLOBALS['OUTPUT'] = $OUTPUT = $RCMAIL->load_gui();
|
|
$RCMAIL->action = 'autocomplete';
|
|
$RCMAIL->imap_init(false);
|
|
$IMAP = $RCMAIL->imap;
|
|
|
|
require_once 'steps/mail/func.inc';
|
|
|
|
$GLOBALS['EMAIL_ADDRESS_PATTERN'] = $EMAIL_ADDRESS_PATTERN;
|
|
}
|
|
|
|
/**
|
|
* Helper method to create a HTML message part object
|
|
*/
|
|
function get_html_part($body)
|
|
{
|
|
$part = new rcube_message_part;
|
|
$part->ctype_primary = 'text';
|
|
$part->ctype_secondary = 'html';
|
|
$part->body = file_get_contents(TESTS_DIR . $body);
|
|
$part->replaces = array();
|
|
return $part;
|
|
}
|
|
|
|
/**
|
|
* Test sanitization of a "normal" html message
|
|
*/
|
|
function test_html()
|
|
{
|
|
$part = $this->get_html_part('src/htmlbody.txt');
|
|
$part->replaces = array('ex1.jpg' => 'part_1.2.jpg', 'ex2.jpg' => 'part_1.2.jpg');
|
|
|
|
// render HTML in normal mode
|
|
$html = rcmail_html4inline(rcmail_print_body($part, array('safe' => false)), 'foo');
|
|
|
|
$this->assertPattern('/src="'.$part->replaces['ex1.jpg'].'"/', $html, "Replace reference to inline image");
|
|
$this->assertPattern('#background="./program/blocked.gif"#', $html, "Replace external background image");
|
|
$this->assertNoPattern('/ex3.jpg/', $html, "No references to external images");
|
|
$this->assertNoPattern('/<meta [^>]+>/', $html, "No meta tags allowed");
|
|
//$this->assertNoPattern('/<style [^>]+>/', $html, "No style tags allowed");
|
|
$this->assertNoPattern('/<form [^>]+>/', $html, "No form tags allowed");
|
|
$this->assertPattern('/Subscription form/', $html, "Include <form> contents");
|
|
$this->assertPattern('/<!-- input ignored -->/', $html, "No input elements allowed");
|
|
$this->assertPattern('/<!-- link ignored -->/', $html, "No external links allowed");
|
|
$this->assertPattern('/<a[^>]+ target="_blank">/', $html, "Set target to _blank");
|
|
$this->assertTrue($GLOBALS['REMOTE_OBJECTS'], "Remote object detected");
|
|
|
|
// render HTML in safe mode
|
|
$html2 = rcmail_html4inline(rcmail_print_body($part, array('safe' => true)), 'foo');
|
|
|
|
$this->assertPattern('/<style [^>]+>/', $html2, "Allow styles in safe mode");
|
|
$this->assertPattern('#src="http://evilsite.net/mailings/ex3.jpg"#', $html2, "Allow external images in HTML (safe mode)");
|
|
$this->assertPattern("#url\('?http://evilsite.net/newsletter/image/bg/bg-64.jpg'?\)#", $html2, "Allow external images in CSS (safe mode)");
|
|
|
|
$css = '<link rel="stylesheet" type="text/css" href="?_task=utils&_action=modcss&u='.urlencode('http://anysite.net/styles/mail.css').'&c=foo"';
|
|
$this->assertPattern('#'.preg_quote($css).'#', $html2, "Filter external styleseehts with bin/modcss.php");
|
|
}
|
|
|
|
/**
|
|
* Test the elimination of some trivial XSS vulnerabilities
|
|
*/
|
|
function test_html_xss()
|
|
{
|
|
$part = $this->get_html_part('src/htmlxss.txt');
|
|
$washed = rcmail_print_body($part, array('safe' => true));
|
|
|
|
$this->assertNoPattern('/src="skins/', $washed, "Remove local references");
|
|
$this->assertNoPattern('/\son[a-z]+/', $washed, "Remove on* attributes");
|
|
|
|
$html = rcmail_html4inline($washed, 'foo');
|
|
$this->assertNoPattern('/onclick="return rcmail.command(\'compose\',\'xss@somehost.net\',this)"/', $html, "Clean mailto links");
|
|
$this->assertNoPattern('/alert/', $html, "Remove alerts");
|
|
}
|
|
|
|
/**
|
|
* Test HTML sanitization to fix the CSS Expression Input Validation Vulnerability
|
|
* reported at http://www.securityfocus.com/bid/26800/
|
|
*/
|
|
function test_html_xss2()
|
|
{
|
|
$part = $this->get_html_part('src/BID-26800.txt');
|
|
$washed = rcmail_print_body($part, array('safe' => true));
|
|
|
|
$this->assertNoPattern('/alert|expression|javascript|xss/', $washed, "Remove evil style blocks");
|
|
$this->assertNoPattern('/font-style:italic/', $washed, "Allow valid styles");
|
|
}
|
|
|
|
/**
|
|
* Test links pattern replacements in plaintext messages
|
|
*/
|
|
function test_plaintext()
|
|
{
|
|
$part = new rcube_message_part;
|
|
$part->ctype_primary = 'text';
|
|
$part->ctype_secondary = 'plain';
|
|
$part->body = quoted_printable_decode(file_get_contents(TESTS_DIR . 'src/plainbody.txt'));
|
|
$html = rcmail_print_body($part, array('safe' => true));
|
|
|
|
$this->assertPattern('/<a href="mailto:nobody@roundcube.net" onclick="return rcmail.command\(\'compose\',\'nobody@roundcube.net\',this\)">nobody@roundcube.net<\/a>/', $html, "Mailto links with onclick");
|
|
$this->assertPattern('#<a href="http://www.apple.com/legal/privacy" target="_blank">http://www.apple.com/legal/privacy</a>#', $html, "Links with target=_blank");
|
|
$this->assertPattern('#\\[<a href="http://example.com/\\?tx\\[a\\]=5" target="_blank">http://example.com/\\?tx\\[a\\]=5</a>\\]#', $html, "Links with square brackets");
|
|
}
|
|
|
|
/**
|
|
* Test mailto links in html messages
|
|
*/
|
|
function test_mailto()
|
|
{
|
|
$part = $this->get_html_part('src/mailto.txt');
|
|
|
|
// render HTML in normal mode
|
|
$html = rcmail_html4inline(rcmail_print_body($part, array('safe' => false)), 'foo');
|
|
|
|
$mailto = '<a href="mailto:me@me.com?subject=this is the subject&body=this is the body"'
|
|
.' onclick="return rcmail.command(\'compose\',\'me@me.com?subject=this is the subject&body=this is the body\',this)">e-mail</a>';
|
|
|
|
$this->assertPattern('|'.preg_quote($mailto, '|').'|', $html, "Extended mailto links");
|
|
}
|
|
|
|
}
|