|
| 1 | +from odoo.tests.common import TransactionCase |
| 2 | + |
| 3 | + |
| 4 | +class TestAuditHtmlEscaping(TransactionCase): |
| 5 | + """Tests that audit log HTML fields properly escape dynamic values.""" |
| 6 | + |
| 7 | + @classmethod |
| 8 | + def setUpClass(cls): |
| 9 | + super().setUpClass() |
| 10 | + cls.model_partner = cls.env["ir.model"].search([("model", "=", "res.partner")], limit=1) |
| 11 | + cls.audit_rule = cls.env["spp.audit.rule"].search([("model_id", "=", cls.model_partner.id)], limit=1) |
| 12 | + if not cls.audit_rule: |
| 13 | + cls.audit_rule = cls.env["spp.audit.rule"].create( |
| 14 | + { |
| 15 | + "name": "Test Rule", |
| 16 | + "model_id": cls.model_partner.id, |
| 17 | + "is_log_create": True, |
| 18 | + "is_log_write": True, |
| 19 | + "is_log_unlink": False, |
| 20 | + } |
| 21 | + ) |
| 22 | + |
| 23 | + def _create_audit_log(self, old_vals, new_vals): |
| 24 | + """Create an audit log record with given old/new values.""" |
| 25 | + data = repr({"old": old_vals, "new": new_vals}) |
| 26 | + return self.env["spp.audit.log"].create( |
| 27 | + { |
| 28 | + "audit_rule_id": self.audit_rule.id, |
| 29 | + "user_id": self.env.uid, |
| 30 | + "model_id": self.model_partner.id, |
| 31 | + "res_id": 1, |
| 32 | + "method": "write", |
| 33 | + "data": data, |
| 34 | + } |
| 35 | + ) |
| 36 | + |
| 37 | + def test_data_html_escapes_script_tags(self): |
| 38 | + """Verify data_html escapes <script> in field values.""" |
| 39 | + xss_payload = '<script>alert("xss")</script>' |
| 40 | + log = self._create_audit_log( |
| 41 | + old_vals={"name": "Safe Name"}, |
| 42 | + new_vals={"name": xss_payload}, |
| 43 | + ) |
| 44 | + html = log.data_html |
| 45 | + self.assertNotIn("<script>", html) |
| 46 | + self.assertIn("<script>", html) |
| 47 | + |
| 48 | + def test_data_html_escapes_html_entities(self): |
| 49 | + """Verify data_html escapes angle brackets and ampersands.""" |
| 50 | + log = self._create_audit_log( |
| 51 | + old_vals={"name": "Before <b>bold</b>"}, |
| 52 | + new_vals={"name": "After <img src=x onerror=alert(1)>"}, |
| 53 | + ) |
| 54 | + html = log.data_html |
| 55 | + self.assertNotIn("<img ", html) |
| 56 | + self.assertIn("<img ", html) |
| 57 | + self.assertNotIn("<b>bold</b>", html) |
| 58 | + self.assertIn("<b>bold</b>", html) |
| 59 | + |
| 60 | + def test_data_html_renders_table_structure(self): |
| 61 | + """Verify data_html still produces valid table structure.""" |
| 62 | + log = self._create_audit_log( |
| 63 | + old_vals={"name": "Old"}, |
| 64 | + new_vals={"name": "New"}, |
| 65 | + ) |
| 66 | + html = log.data_html |
| 67 | + self.assertIn("<table", html) |
| 68 | + self.assertIn("<thead>", html) |
| 69 | + self.assertIn("<tbody>", html) |
| 70 | + self.assertIn("<td>", html) |
| 71 | + |
| 72 | + def test_parent_data_html_escapes_script_tags(self): |
| 73 | + """Verify parent_data_html escapes <script> in field values.""" |
| 74 | + xss_payload = '<script>alert("xss")</script>' |
| 75 | + parent_model = self.env["ir.model"].search([("model", "=", "res.partner")], limit=1) |
| 76 | + log = self.env["spp.audit.log"].create( |
| 77 | + { |
| 78 | + "audit_rule_id": self.audit_rule.id, |
| 79 | + "user_id": self.env.uid, |
| 80 | + "model_id": self.model_partner.id, |
| 81 | + "res_id": 1, |
| 82 | + "method": "write", |
| 83 | + "data": repr({"old": {"name": "Safe"}, "new": {"name": xss_payload}}), |
| 84 | + "parent_model_id": parent_model.id, |
| 85 | + "parent_res_ids_str": "1", |
| 86 | + } |
| 87 | + ) |
| 88 | + html = log.parent_data_html |
| 89 | + self.assertNotIn("<script>", html) |
| 90 | + self.assertIn("<script>", html) |
0 commit comments