• Lukasz Anforowicz's avatar
    Anti-URL-spoofing test for invalid URL committed with an opaque origin. · e2077a9a
    Lukasz Anforowicz authored
    This CL verifies that the browser process will reject attempts that a
    comprimised foo.com renderer can make in an attempt to show a bar.com
    URL in the Omnibox.
    
    Before this CL, there was already a
    SecurityExploitBrowserTest.DidCommitInvalidURL test: committing A)
    bar.com URL with B) origin set to foo.com, C) in a process locked to
    foo.com.
    
    This CL adds DidCommitInvalidURLWithOpaqueOrigin test which tests
    committing A) bar.com URL, B) with opaque origin derived from foo.com,
    C) in a process locked to foo.com.
    
    Fixed: 918565
    Change-Id: I332349e889b83d1cd298050adbf9dca2f55125ba
    Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2368288
    Auto-Submit: Łukasz Anforowicz <lukasza@chromium.org>
    Reviewed-by: default avatarNasko Oskov <nasko@chromium.org>
    Commit-Queue: Łukasz Anforowicz <lukasza@chromium.org>
    Cr-Commit-Position: refs/heads/master@{#800786}
    e2077a9a
security_exploit_browsertest.cc 75.6 KB