File: cve_2019_8322_spec.rb

package info (click to toggle)
ruby3.1 3.1.2-7%2Bdeb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 132,892 kB
  • sloc: ruby: 1,154,753; ansic: 736,782; yacc: 46,445; pascal: 10,401; sh: 3,931; cpp: 1,158; python: 838; makefile: 787; asm: 462; javascript: 382; lisp: 97; sed: 94; perl: 62; awk: 36; xml: 4
file content (21 lines) | stat: -rw-r--r-- 631 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
require_relative '../spec_helper'

require 'yaml'
require 'rubygems'
require 'rubygems/safe_yaml'
require 'rubygems/commands/owner_command'

describe "CVE-2019-8322 is resisted by" do
  it "sanitising owner names" do
    command = Gem::Commands::OwnerCommand.new
    def command.rubygems_api_request(*args)
      Struct.new(:body).new("---\n- email: \"\e]2;nyan\a\"\n  handle: handle\n  id: id\n")
    end
    def command.with_response(response)
      yield response
    end
    command.should_receive(:say).with("Owners for gem: name")
    command.should_receive(:say).with("- .]2;nyan.")
    command.show_owners "name"
  end
end