diff --git a/tests/www/test_views.py b/tests/www/test_views.py index 517d4bc56f997..5ef5a2193f111 100644 --- a/tests/www/test_views.py +++ b/tests/www/test_views.py @@ -32,7 +32,7 @@ from typing import Any, Dict, Generator, List, NamedTuple from unittest import mock from unittest.mock import PropertyMock -from urllib.parse import quote_plus +from urllib.parse import parse_qsl, quote_plus import jinja2 import pytest @@ -2772,33 +2772,6 @@ def test_trigger_dag_form(self): resp = self.client.get(f'trigger?dag_id={test_dag_id}') self.check_content_in_response(f'Trigger DAG: {test_dag_id}', resp) - @parameterized.expand( - [ - ("javascript:alert(1)", "/home"), - ("http://google.com", "/home"), - ( - "%2Ftree%3Fdag_id%3Dexample_bash_operator';alert(33)//", - "/tree?dag_id=example_bash_operator%27&alert%2833%29%2F%2F=", - ), - ("%2Ftree%3Fdag_id%3Dexample_bash_operator", "/tree?dag_id=example_bash_operator"), - ("%2Fgraph%3Fdag_id%3Dexample_bash_operator", "/graph?dag_id=example_bash_operator"), - ] - ) - @pytest.mark.skipif( - sys.version_info < (3, 8, 8), - reason='Vulnerability was fixed in Python 3.8.8 which changed the query string separator: bpo-42967', - ) - def test_trigger_dag_form_origin_url_py_lte_387(self, test_origin, expected_origin): - test_dag_id = "example_bash_operator" - - resp = self.client.get(f'trigger?dag_id={test_dag_id}&origin={test_origin}') - self.check_content_in_response( - '