1
0
Fork 0
mirror of https://github.com/sinatra/sinatra synced 2023-03-27 23:18:01 -04:00
sinatra/rack-protection/spec/lib/rack/protection/cookie_tossing_spec.rb
Jordan Owens cd5028b5c9 Add cookie tossing protection
Mitigate malicious session cookies set on a subdomain from
being read by the parent domain.
2016-07-30 19:04:44 -04:00

74 lines
2.7 KiB
Ruby

describe Rack::Protection::CookieTossing do
it_behaves_like "any rack application"
context 'with default reaction' do
before(:each) do
mock_app do
use Rack::Protection::CookieTossing
run DummyApp
end
end
it 'accepts requests with a single session cookie' do
get '/', {}, 'HTTP_COOKIE' => 'rack.session=SESSION_TOKEN'
expect(last_response).to be_ok
end
it 'denies requests with duplicate session cookies' do
get '/', {}, 'HTTP_COOKIE' => 'rack.session=EVIL_SESSION_TOKEN; rack.session=SESSION_TOKEN'
expect(last_response).not_to be_ok
end
it 'denies requests with sneaky encoded session cookies' do
get '/', {}, 'HTTP_COOKIE' => 'rack.session=EVIL_SESSION_TOKEN; rack.%73ession=SESSION_TOKEN'
expect(last_response).not_to be_ok
end
it 'adds the correct Set-Cookie header' do
get '/some/path', {}, 'HTTP_COOKIE' => 'rack.%73ession=EVIL_SESSION_TOKEN; rack.session=EVIL_SESSION_TOKEN; rack.session=SESSION_TOKEN'
expected_header = <<-END.chomp
rack.%2573ession=; domain=example.org; path=/; expires=Thu, 01 Jan 1970 00:00:00 -0000
rack.%2573ession=; domain=example.org; path=/some; expires=Thu, 01 Jan 1970 00:00:00 -0000
rack.%2573ession=; domain=example.org; path=/some/path; expires=Thu, 01 Jan 1970 00:00:00 -0000
rack.session=; domain=example.org; path=/; expires=Thu, 01 Jan 1970 00:00:00 -0000
rack.session=; domain=example.org; path=/some; expires=Thu, 01 Jan 1970 00:00:00 -0000
rack.session=; domain=example.org; path=/some/path; expires=Thu, 01 Jan 1970 00:00:00 -0000
END
expect(last_response.headers['Set-Cookie']).to eq(expected_header)
end
end
context 'with redirect reaction' do
before(:each) do
mock_app do
use Rack::Protection::CookieTossing, :reaction => :redirect
run DummyApp
end
end
it 'redirects requests with duplicate session cookies' do
get '/', {}, 'HTTP_COOKIE' => 'rack.session=EVIL_SESSION_TOKEN; rack.session=SESSION_TOKEN'
expect(last_response).to be_redirect
expect(last_response.location).to eq('/')
end
it 'redirects requests with sneaky encoded session cookies' do
get '/path', {}, 'HTTP_COOKIE' => 'rack.%73ession=EVIL_SESSION_TOKEN; rack.session=SESSION_TOKEN'
expect(last_response).to be_redirect
expect(last_response.location).to eq('/path')
end
end
context 'with custom session key' do
it 'denies requests with duplicate session cookies' do
mock_app do
use Rack::Protection::CookieTossing, :session_key => '_session'
run DummyApp
end
get '/', {}, 'HTTP_COOKIE' => '_session=EVIL_SESSION_TOKEN; _session=SESSION_TOKEN'
expect(last_response).not_to be_ok
end
end
end