Anti-URL-spoofing test for invalid URL committed with an opaque origin.
This CL verifies that the browser process will reject attempts that a comprimised foo.com renderer can make in an attempt to show a bar.com URL in the Omnibox. Before this CL, there was already a SecurityExploitBrowserTest.DidCommitInvalidURL test: committing A) bar.com URL with B) origin set to foo.com, C) in a process locked to foo.com. This CL adds DidCommitInvalidURLWithOpaqueOrigin test which tests committing A) bar.com URL, B) with opaque origin derived from foo.com, C) in a process locked to foo.com. Fixed: 918565 Change-Id: I332349e889b83d1cd298050adbf9dca2f55125ba Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2368288 Auto-Submit: Łukasz Anforowicz <lukasza@chromium.org> Reviewed-by:Nasko Oskov <nasko@chromium.org> Commit-Queue: Łukasz Anforowicz <lukasza@chromium.org> Cr-Commit-Position: refs/heads/master@{#800786}
Showing
Please register or sign in to comment