|
| 1 | +// Copyright (c) Microsoft Corporation. |
| 2 | +// Licensed under the MIT License. |
| 3 | + |
| 4 | +#include "pch.h" |
| 5 | +#include "../Shared/InputValidation.h" |
| 6 | + |
| 7 | +using namespace Microsoft::ReactNative::InputValidation; |
| 8 | + |
| 9 | +// ============================================================================ |
| 10 | +// SDL COMPLIANCE TESTS - URL Validation (SSRF Prevention) |
| 11 | +// ============================================================================ |
| 12 | + |
| 13 | +TEST(URLValidatorTest, AllowsHTTPSchemesOnly) { |
| 14 | + // Positive: http and https allowed |
| 15 | + EXPECT_NO_THROW(URLValidator::ValidateURL("http://example.com", {"http", "https"})); |
| 16 | + EXPECT_NO_THROW(URLValidator::ValidateURL("https://example.com", {"http", "https"})); |
| 17 | + |
| 18 | + // Negative: file, ftp, javascript blocked |
| 19 | + EXPECT_THROW(URLValidator::ValidateURL("file:///etc/passwd", {"http", "https"}), ValidationException); |
| 20 | + EXPECT_THROW(URLValidator::ValidateURL("ftp://example.com", {"http", "https"}), ValidationException); |
| 21 | + EXPECT_THROW(URLValidator::ValidateURL("javascript:alert(1)", {"http", "https"}), ValidationException); |
| 22 | +} |
| 23 | + |
| 24 | +TEST(URLValidatorTest, BlocksLocalhostVariants) { |
| 25 | + // SDL Test Case: Block localhost |
| 26 | + EXPECT_THROW(URLValidator::ValidateURL("https://localhost/", {"http", "https"}), ValidationException); |
| 27 | + EXPECT_THROW(URLValidator::ValidateURL("https://localHoSt/", {"http", "https"}), ValidationException); |
| 28 | + EXPECT_THROW(URLValidator::ValidateURL("https://ip6-localhost/", {"http", "https"}), ValidationException); |
| 29 | +} |
| 30 | + |
| 31 | +TEST(URLValidatorTest, BlocksLoopbackIPs) { |
| 32 | + // SDL Test Case: Block 127.x.x.x |
| 33 | + EXPECT_THROW(URLValidator::ValidateURL("https://127.0.0.1/", {"http", "https"}), ValidationException); |
| 34 | + EXPECT_THROW(URLValidator::ValidateURL("https://127.0.1.2/", {"http", "https"}), ValidationException); |
| 35 | + EXPECT_THROW(URLValidator::ValidateURL("https://127.255.255.255/", {"http", "https"}), ValidationException); |
| 36 | +} |
| 37 | + |
| 38 | +TEST(URLValidatorTest, BlocksIPv6Loopback) { |
| 39 | + // SDL Test Case: Block ::1 |
| 40 | + EXPECT_THROW(URLValidator::ValidateURL("https://[::1]/", {"http", "https"}), ValidationException); |
| 41 | + EXPECT_THROW(URLValidator::ValidateURL("https://[0:0:0:0:0:0:0:1]/", {"http", "https"}), ValidationException); |
| 42 | +} |
| 43 | + |
| 44 | +TEST(URLValidatorTest, BlocksAWSMetadata) { |
| 45 | + // SDL Test Case: Block 169.254.169.254 |
| 46 | + EXPECT_THROW(URLValidator::ValidateURL("http://169.254.169.254/latest/meta-data/", {"http", "https"}), ValidationException); |
| 47 | +} |
| 48 | + |
| 49 | +TEST(URLValidatorTest, BlocksPrivateIPRanges) { |
| 50 | + // SDL Test Case: Block private IPs |
| 51 | + EXPECT_THROW(URLValidator::ValidateURL("https://10.0.0.1/", {"http", "https"}), ValidationException); |
| 52 | + EXPECT_THROW(URLValidator::ValidateURL("https://192.168.1.1/", {"http", "https"}), ValidationException); |
| 53 | + EXPECT_THROW(URLValidator::ValidateURL("https://172.16.0.1/", {"http", "https"}), ValidationException); |
| 54 | + EXPECT_THROW(URLValidator::ValidateURL("https://172.31.255.255/", {"http", "https"}), ValidationException); |
| 55 | +} |
| 56 | + |
| 57 | +TEST(URLValidatorTest, BlocksIPv6PrivateRanges) { |
| 58 | + // SDL Test Case: Block fc00::/7 and fe80::/10 |
| 59 | + EXPECT_THROW(URLValidator::ValidateURL("https://[fc00::]/", {"http", "https"}), ValidationException); |
| 60 | + EXPECT_THROW(URLValidator::ValidateURL("https://[fe80::]/", {"http", "https"}), ValidationException); |
| 61 | + EXPECT_THROW(URLValidator::ValidateURL("https://[fd00::]/", {"http", "https"}), ValidationException); |
| 62 | +} |
| 63 | + |
| 64 | +TEST(URLValidatorTest, DecodesDoubleEncodedURLs) { |
| 65 | + // SDL Requirement: Decode URLs until no further decoding possible |
| 66 | + // %252e%252e = %2e%2e = .. (double encoded) |
| 67 | + std::string url = "https://example.com/%252e%252e/etc/passwd"; |
| 68 | + std::string decoded = URLValidator::DecodeURL(url); |
| 69 | + EXPECT_TRUE(decoded.find("..") != std::string::npos); |
| 70 | +} |
| 71 | + |
| 72 | +TEST(URLValidatorTest, EnforcesMaxLength) { |
| 73 | + // SDL: URL length limit (2048 bytes) |
| 74 | + std::string longURL = "https://example.com/" + std::string(3000, 'a'); |
| 75 | + EXPECT_THROW(URLValidator::ValidateURL(longURL, {"http", "https"}), ValidationException); |
| 76 | +} |
| 77 | + |
| 78 | +TEST(URLValidatorTest, AllowsPublicURLs) { |
| 79 | + // Positive: Public URLs should work |
| 80 | + EXPECT_NO_THROW(URLValidator::ValidateURL("https://example.com/api/data", {"http", "https"})); |
| 81 | + EXPECT_NO_THROW(URLValidator::ValidateURL("https://github.com/microsoft/react-native-windows", {"http", "https"})); |
| 82 | +} |
| 83 | + |
| 84 | +// ============================================================================ |
| 85 | +// SDL COMPLIANCE TESTS - Path Traversal Prevention |
| 86 | +// ============================================================================ |
| 87 | + |
| 88 | +TEST(PathValidatorTest, DetectsBasicTraversal) { |
| 89 | + // SDL Test Case: Detect ../ |
| 90 | + EXPECT_TRUE(PathValidator::ContainsTraversal("../../etc/passwd")); |
| 91 | + EXPECT_TRUE(PathValidator::ContainsTraversal("..\\..\\windows\\system32")); |
| 92 | + EXPECT_TRUE(PathValidator::ContainsTraversal("/../../OtherPath/")); |
| 93 | +} |
| 94 | + |
| 95 | +TEST(PathValidatorTest, DetectsEncodedTraversal) { |
| 96 | + // SDL Test Case: Detect %2e%2e |
| 97 | + EXPECT_TRUE(PathValidator::ContainsTraversal("%2e%2e%2f%2e%2e%2fOtherPath")); |
| 98 | + EXPECT_TRUE(PathValidator::ContainsTraversal("/%2E%2E/etc/passwd")); |
| 99 | +} |
| 100 | + |
| 101 | +TEST(PathValidatorTest, DetectsDoubleEncodedTraversal) { |
| 102 | + // SDL Test Case: Detect %252e%252e (double encoded) |
| 103 | + EXPECT_TRUE(PathValidator::ContainsTraversal("%252e%252e%252f")); |
| 104 | + EXPECT_TRUE(PathValidator::ContainsTraversal("/%252E%252E%252fOtherPath/")); |
| 105 | +} |
| 106 | + |
| 107 | +TEST(PathValidatorTest, DetectsEncodedBackslash) { |
| 108 | + // SDL Test Case: Detect %5c (backslash) |
| 109 | + EXPECT_TRUE(PathValidator::ContainsTraversal("%5c%5c")); |
| 110 | + EXPECT_TRUE(PathValidator::ContainsTraversal("%255c%255c")); // Double encoded |
| 111 | +} |
| 112 | + |
| 113 | +TEST(PathValidatorTest, ValidBlobIDFormat) { |
| 114 | + // Positive: Valid blob IDs |
| 115 | + EXPECT_NO_THROW(PathValidator::ValidateBlobId("blob123")); |
| 116 | + EXPECT_NO_THROW(PathValidator::ValidateBlobId("abc-def_123")); |
| 117 | + EXPECT_NO_THROW(PathValidator::ValidateBlobId("A1B2C3")); |
| 118 | +} |
| 119 | + |
| 120 | +TEST(PathValidatorTest, InvalidBlobIDFormats) { |
| 121 | + // Negative: Invalid characters |
| 122 | + EXPECT_THROW(PathValidator::ValidateBlobId("blob/../etc"), ValidationException); |
| 123 | + EXPECT_THROW(PathValidator::ValidateBlobId("blob/file"), ValidationException); |
| 124 | + EXPECT_THROW(PathValidator::ValidateBlobId("blob\\file"), ValidationException); |
| 125 | +} |
| 126 | + |
| 127 | +TEST(PathValidatorTest, BlobIDLengthLimit) { |
| 128 | + // SDL: Max 128 characters |
| 129 | + std::string validLength(128, 'a'); |
| 130 | + EXPECT_NO_THROW(PathValidator::ValidateBlobId(validLength)); |
| 131 | + |
| 132 | + std::string tooLong(129, 'a'); |
| 133 | + EXPECT_THROW(PathValidator::ValidateBlobId(tooLong), ValidationException); |
| 134 | +} |
| 135 | + |
| 136 | +TEST(PathValidatorTest, BundlePathTraversalBlocked) { |
| 137 | + // SDL: Block path traversal in bundle paths |
| 138 | + EXPECT_THROW(PathValidator::ValidateBundlePath("../../etc/passwd"), ValidationException); |
| 139 | + EXPECT_THROW(PathValidator::ValidateBundlePath("..\\..\\windows"), ValidationException); |
| 140 | + EXPECT_THROW(PathValidator::ValidateBundlePath("%2e%2e%2f"), ValidationException); |
| 141 | +} |
| 142 | + |
| 143 | +// ============================================================================ |
| 144 | +// SDL COMPLIANCE TESTS - Size Validation (DoS Prevention) |
| 145 | +// ============================================================================ |
| 146 | + |
| 147 | +TEST(SizeValidatorTest, EnforcesMaxBlobSize) { |
| 148 | + // SDL: 100MB max |
| 149 | + EXPECT_NO_THROW(SizeValidator::ValidateSize(100 * 1024 * 1024, SizeValidator::MAX_BLOB_SIZE, "Blob")); |
| 150 | + EXPECT_THROW(SizeValidator::ValidateSize(101 * 1024 * 1024, SizeValidator::MAX_BLOB_SIZE, "Blob"), ValidationException); |
| 151 | +} |
| 152 | + |
| 153 | +TEST(SizeValidatorTest, EnforcesMaxWebSocketFrame) { |
| 154 | + // SDL: 256MB max |
| 155 | + EXPECT_NO_THROW(SizeValidator::ValidateSize(256 * 1024 * 1024, SizeValidator::MAX_WEBSOCKET_FRAME, "WebSocket")); |
| 156 | + EXPECT_THROW(SizeValidator::ValidateSize(257 * 1024 * 1024, SizeValidator::MAX_WEBSOCKET_FRAME, "WebSocket"), ValidationException); |
| 157 | +} |
| 158 | + |
| 159 | +TEST(SizeValidatorTest, EnforcesCloseReasonLimit) { |
| 160 | + // SDL: 123 bytes max (WebSocket spec) |
| 161 | + EXPECT_NO_THROW(SizeValidator::ValidateSize(123, SizeValidator::MAX_CLOSE_REASON, "Close reason")); |
| 162 | + EXPECT_THROW(SizeValidator::ValidateSize(124, SizeValidator::MAX_CLOSE_REASON, "Close reason"), ValidationException); |
| 163 | +} |
| 164 | + |
| 165 | +// ============================================================================ |
| 166 | +// SDL COMPLIANCE TESTS - Encoding Validation |
| 167 | +// ============================================================================ |
| 168 | + |
| 169 | +TEST(EncodingValidatorTest, ValidBase64Format) { |
| 170 | + // Positive: Valid base64 |
| 171 | + EXPECT_TRUE(EncodingValidator::IsValidBase64("SGVsbG8gV29ybGQ=")); |
| 172 | + EXPECT_TRUE(EncodingValidator::IsValidBase64("YWJjZGVmZ2hpamtsbW5vcA==")); |
| 173 | +} |
| 174 | + |
| 175 | +TEST(EncodingValidatorTest, InvalidBase64Format) { |
| 176 | + // Negative: Invalid base64 |
| 177 | + EXPECT_FALSE(EncodingValidator::IsValidBase64("Not@Valid!")); |
| 178 | + EXPECT_FALSE(EncodingValidator::IsValidBase64("")); // Empty |
| 179 | +} |
| 180 | + |
| 181 | +// ============================================================================ |
| 182 | +// SDL COMPLIANCE TESTS - Numeric Validation |
| 183 | +// ============================================================================ |
| 184 | + |
| 185 | +TEST(NumericValidatorTest, ValidatesRequestId) { |
| 186 | + // Positive: Valid request IDs |
| 187 | + EXPECT_NO_THROW(NumericValidator::ValidateRequestId(1)); |
| 188 | + EXPECT_NO_THROW(NumericValidator::ValidateRequestId(1000000)); |
| 189 | + |
| 190 | + // Negative: Invalid request IDs |
| 191 | + EXPECT_THROW(NumericValidator::ValidateRequestId(-1), ValidationException); |
| 192 | +} |
| 193 | + |
| 194 | +TEST(NumericValidatorTest, ValidatesSocketId) { |
| 195 | + // Positive: Valid socket IDs |
| 196 | + EXPECT_NO_THROW(NumericValidator::ValidateSocketId(1.0)); |
| 197 | + EXPECT_NO_THROW(NumericValidator::ValidateSocketId(12345.0)); |
| 198 | + |
| 199 | + // Negative: Invalid socket IDs (negative, NaN, Infinity) |
| 200 | + EXPECT_THROW(NumericValidator::ValidateSocketId(-1.0), ValidationException); |
| 201 | + EXPECT_THROW(NumericValidator::ValidateSocketId(std::numeric_limits<double>::quiet_NaN()), ValidationException); |
| 202 | + EXPECT_THROW(NumericValidator::ValidateSocketId(std::numeric_limits<double>::infinity()), ValidationException); |
| 203 | +} |
| 204 | + |
| 205 | +// ============================================================================ |
| 206 | +// SDL COMPLIANCE TESTS - Header CRLF Injection Prevention |
| 207 | +// ============================================================================ |
| 208 | + |
| 209 | +TEST(HeaderValidatorTest, ValidHeaders) { |
| 210 | + // Positive: Valid headers |
| 211 | + std::map<std::string, std::string> validHeaders = { |
| 212 | + {"Content-Type", "application/json"}, |
| 213 | + {"Authorization", "Bearer token123"}, |
| 214 | + {"User-Agent", "ReactNative/1.0"} |
| 215 | + }; |
| 216 | + EXPECT_NO_THROW(HeaderValidator::ValidateHeaders(validHeaders)); |
| 217 | +} |
| 218 | + |
| 219 | +TEST(HeaderValidatorTest, DetectsCRLFInHeaderKey) { |
| 220 | + // SDL Test Case: Block CRLF in header keys |
| 221 | + std::map<std::string, std::string> maliciousHeaders = { |
| 222 | + {"Content-Type\r\nX-Injected", "value"} |
| 223 | + }; |
| 224 | + EXPECT_THROW(HeaderValidator::ValidateHeaders(maliciousHeaders), ValidationException); |
| 225 | +} |
| 226 | + |
| 227 | +TEST(HeaderValidatorTest, DetectsCRLFInHeaderValue) { |
| 228 | + // SDL Test Case: Block CRLF in header values |
| 229 | + std::map<std::string, std::string> maliciousHeaders = { |
| 230 | + {"Content-Type", "application/json\r\nX-Injected: evil"} |
| 231 | + }; |
| 232 | + EXPECT_THROW(HeaderValidator::ValidateHeaders(maliciousHeaders), ValidationException); |
| 233 | +} |
| 234 | + |
| 235 | +TEST(HeaderValidatorTest, DetectsLFOnly) { |
| 236 | + // SDL Test Case: Block LF alone (not just CRLF) |
| 237 | + std::map<std::string, std::string> maliciousHeaders = { |
| 238 | + {"Content-Type", "application/json\nX-Injected: evil"} |
| 239 | + }; |
| 240 | + EXPECT_THROW(HeaderValidator::ValidateHeaders(maliciousHeaders), ValidationException); |
| 241 | +} |
| 242 | + |
| 243 | +TEST(HeaderValidatorTest, DetectsCROnly) { |
| 244 | + // SDL Test Case: Block CR alone |
| 245 | + std::map<std::string, std::string> maliciousHeaders = { |
| 246 | + {"Content-Type", "application/json\rX-Injected: evil"} |
| 247 | + }; |
| 248 | + EXPECT_THROW(HeaderValidator::ValidateHeaders(maliciousHeaders), ValidationException); |
| 249 | +} |
| 250 | + |
| 251 | +// ============================================================================ |
| 252 | +// SDL COMPLIANCE TESTS - Logging |
| 253 | +// ============================================================================ |
| 254 | + |
| 255 | +TEST(ValidationLoggerTest, LogsFailures) { |
| 256 | + // Trigger validation failure to test logging |
| 257 | + try { |
| 258 | + URLValidator::ValidateURL("https://localhost/", {"http", "https"}); |
| 259 | + FAIL() << "Expected ValidationException"; |
| 260 | + } catch (const ValidationException& ex) { |
| 261 | + // Verify exception message is meaningful |
| 262 | + std::string message = ex.what(); |
| 263 | + EXPECT_FALSE(message.empty()); |
| 264 | + EXPECT_TRUE(message.find("localhost") != std::string::npos || message.find("SSRF") != std::string::npos); |
| 265 | + } |
| 266 | +} |
0 commit comments