Internet Explorer Injection Problem

  • KM03755528
  • 28-Oct-2020
  • 28-Oct-2020

Summary

Internet Explorer Injection Problem

Question

If unchecking “Enforce standard mode” in Truclient IE can resolve the unexpected behavior, then please try this solution.

linktext

Background:

Truclient will inject code into webpages. This may cause some unexpected behavior of AUT(Application under test)

linktext

Answer

Put a “IEInjectionBlacklist.ini” file under the script folder. To blacklist the code injection to target URLs.

Example of “IEInjectionBlacklist.ini” format:

Example 1, use both urls and regex:

[Urls]

http://kalimanjaro.hpeswlab.net/webgui/multiplefileform.html

[http://www.google.co.il*]www.google.co.il*

http://16.44.49.218/*/Index.htm

[regexUrls]

^http:\/\/www/\.hpe/\.com\/.*

Example 2, use url only:

[Urls]

http://kalimanjaro.hpeswlab.net/webgui/multiplefileform.html

Example 3, use regex only:

[regexUrls]

^http:\/\/www/\.hpe/\.com\/.*

How do I know whether I successfully blocked code injection to the target page?

The following code will exist to page that is been injected our code:

<!doctype html><meta id="hp_injected_meta" http-equiv="X-UA-Compatible" content="IE=edge"> <script type="text/javascript" id="hp_injected_script" src="C:\Program Files (x86)\Micro Focus\LoadRunner\dat\WebIE\RRE\content\injectedCode\injectToAUTWin.js?mode=interactive"></script><!DOCTYPE html>    

If you right click the page and click on “View Source”, but no such signature looks like above exist. Then the blacklist should doing its job.