File: echo-eval-with-policy.py

package info (click to toggle)
firefox-esr 140.5.0esr-1~deb13u1
  • links: PTS, VCS
  • area: main
  • in suites: trixie-proposed-updates
  • size: 4,539,036 kB
  • sloc: cpp: 7,381,527; javascript: 6,388,905; ansic: 3,710,087; python: 1,393,776; xml: 628,165; asm: 426,918; java: 184,004; sh: 65,744; makefile: 19,302; objc: 13,059; perl: 12,912; yacc: 4,583; cs: 3,846; pascal: 3,352; lex: 1,720; ruby: 1,226; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (30 lines) | stat: -rw-r--r-- 732 bytes parent folder | download | duplicates (20)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
def main(request, response):
    policy = request.GET.first(b"policy")
    return [(b"Content-Type", b"text/html"), (b"Content-Security-Policy", policy)], b"""
<!DOCTYPE html>
<html>
<script>
function check_eval(context) {
  context.eval_check_variable = 0;
  try {
    id = context.eval("eval_check_variable + 1");
  } catch (e) {
    if (e instanceof EvalError) {
      if (context.eval_check_variable === 0)
        return "blocked";
      else
        return "EvalError exception, but eval was executed";
    } else {
      return "Unexpected exception: " + e.message;
    }
  }
  return "allowed";
}

window.parent.postMessage({
  evalInIframe: check_eval(window),
  evalInParent: check_eval(parent),
});
</script>
</html>
"""