Skip to content

Commit

Permalink
varints -> variants (#1550)
Browse files Browse the repository at this point in the history
  • Loading branch information
ParaBolt authored Nov 27, 2024
1 parent f3fef14 commit 6920eb3
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion cheatsheets/DOM_Clobbering_Prevention_Cheat_Sheet.md
Original file line number Diff line number Diff line change
Expand Up @@ -124,7 +124,7 @@ containerDOMElement.setHTML(input, {sanitizer: sanitizerInstance});

[Content-Security Policy (CSP)](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy) is a set of rules that tell the browser which resources are allowed to be loaded on a web page. By restricting the sources of JavaScript files (e.g., with the [script-src](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src) directive), CSP can prevent malicious code from being injected into the page.

**Note:** CSP can only mitigate **some varints** of DOM clobbering attacks, such as when attackers attempt to load new scripts by clobbering script sources, but not when already-present code can be abused for code execution, e.g., clobbering the parameters of code evaluation constructs like `eval()`.
**Note:** CSP can only mitigate **some variants** of DOM clobbering attacks, such as when attackers attempt to load new scripts by clobbering script sources, but not when already-present code can be abused for code execution, e.g., clobbering the parameters of code evaluation constructs like `eval()`.

### \#3: Freezing Sensitive DOM Objects

Expand Down

0 comments on commit 6920eb3

Please sign in to comment.