Clobbering DOM Attributes to Bypass HTML Filters and Trigger DOM-Based XSS
This article demonstrates a unique form of DOM-based Cross-Site Scripting (XSS) by exploiting property collisions in the Document Object Model (DOM). The application filters user comments for restricted HTML but overlooks unsafe assumptions about specific DOM properties. By intentionally clobbering an existing property (onclick), the researcher overwrites its original value with malicious code, effectively bypassing filtering mechanisms that should have removed it. Although event handlers such as onclick and onfocus were supposed to be removed, the clobber attack allowed their retention. This vulnerability can result in sensitive data exposure or account takeover. The researcher did not disclose a bounty amount, but the article serves as a valuable lesson for security researchers to scrutinize assumptions about DOM properties during sanitization. Key lesson: Carefully examine all DOM properties when implementing HTML filtering to avoid clobber attacks. #BugBounty #Cybersecurity #DOMXSS #InformationDisclosure

https://meetcyber.net/clobbering-dom-attributes-to-bypass-html-filters-and-trigger-dom-based-xss-cc2afb437bde

Clobbering DOM Attributes to Bypass HTML Filters and Trigger DOM-Based XSS

How DOM property collisions quietly break client-side HTML sanitization.

Medium
BSidesNYC 2024 -Trusted Types: DOM XSS Protection at Scale

YouTube

Mozilla has revised its position on a web security technology called Trusted Types, and will implement it in Firefox. Doing so will help reduce a longstanding form of web attack that relies on injected code.

#mozilla #firefox #browser #security #domxss
https://tchlp.com/3RQiN22

Mozilla decides Trusted Types is a worthy security feature

DOM-XSS attacks have become scarce on Google websites since TT debuted

The Register