Did you know nomination[edit]

The following is an archived discussion of the DYK nomination of the article below. Please do not modify this page. Subsequent comments should be made on the appropriate discussion page (such as this nomination's talk page, the article's talk page or Wikipedia talk:Did you know), unless there is consensus to re-open the discussion at this page. No further edits should be made to this page.

The result was: promoted by Bruxton talk 22:25, 5 December 2023 (UTC)[reply]

5x expanded by Sohom Datta (talk). Self-nominated at 20:01, 9 November 2023 (UTC). Post-promotion hook changes for this nom will be logged at Template talk:Did you know nominations/DOM Clobbering; consider watching this nomination, if it is successful, until the hook appears on the Main Page.[reply]

 Doing... Clyde [trout needed] 19:47, 11 November 2023 (UTC)[reply]

General: Article is new enough and long enough
Policy: Article is sourced, neutral, and free of copyright problems
Hook: Hook has been verified by provided inline citation
QPQ: Done.
Overall: Sohom Datta, good work. I'd say ALT0 is the most "hooky", but all are fine. Clyde [trout needed] 19:56, 11 November 2023 (UTC)[reply]

Comments from Maury Markowitz[edit]

The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.


@Sohom Datta: This is not a full review, but I have some comments for things that I think need to be addressed:

Maury Markowitz (talk) 17:07, 4 December 2023 (UTC)[reply]

@Maury Markowitz I have tried to address your concerns
  • I've added some context as to how this attack uses the assignment of the variable to influence code execution.
  • I've added a example section to give a small example of how the attack might look like
  • I've updated the threat model to explain how a attack could inject markup into the page, I don't think it is compared to another attack, we just say that the 'threat model' being considered for this attack is similar to that which would be expected in a classical 'web attacker threat model'
  • The paper (Towards a Formal Foundation of Web Security) was one of the first papers to formally define what a 'web attacker threat model' actually is. (which is why it is cited right after the discussion regarding the model). The JSAgents/DOMPurify paper references the model, but does not delve into what it actually is (AFAIR)
  • I've moved the History section to the top.
Let me know if you have any other concerns. Sohom (talk) 19:37, 4 December 2023 (UTC)[reply]
@Maury Markowitz (Friendly re-ping) Let me know if there are any other things that I should address :)
Also, just a heads up, I might have some reduced availiability next week for personal reasons :) Sohom (talk) 19:31, 6 December 2023 (UTC)[reply]

@Sohom Datta: Excellent update, my issues have been resolved! Maury Markowitz (talk) 17:33, 18 December 2023 (UTC)[reply]

The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.

GA Review[edit]

The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.


This review is transcluded from Talk:DOM clobbering/GA1. The edit link for this section can be used to add comments to the review.

Reviewer: Elli (talk · contribs) 21:18, 19 February 2024 (UTC)[reply]

Claiming this review. Will go through the article in the next few days. Elli (talk | contribs) 21:18, 19 February 2024 (UTC)[reply]

@Elli are you going to work on this? RoySmith (talk) 16:57, 4 March 2024 (UTC)[reply]
Sorry, just been caught up with a lot of stuff the past few weeks and haven't gotten the chance to sit down for an in-depth review. I am still planning to do this soon. Elli (talk | contribs) 17:31, 4 March 2024 (UTC)[reply]

History[edit]

I've added another source :)
The blog post is a guest post by Gareth Heyes, who is a subject matter expert and PortSwigger is a fairly well-known (in the field) web-security-research-oriented company that regularly features posts from experts on their blog. I personally would consider that source to be fairly reliable.
I'll try to see if I can get any reporting on the rest, however, this might be a bit difficult since such proposals rarely make it into traditional RS
Done :)

@Sohom Datta: I am very sorry for the delay in starting this review. I'll get to the other sections soon. Elli (talk | contribs) 19:16, 4 March 2024 (UTC)[reply]

No issues, feel free to take your time :) Sohom (talk) 15:12, 5 March 2024 (UTC)[reply]

Vulnerability[edit]

 Done

Example[edit]

 Done

Threat model[edit]

The next sentence goes into the highlights of the model that are relevant to the article. Describing the whole model wouldn't be relevant to the page and I don't think we have a article for this specific model. (Hopefully once we have better coverage of this subject area, we should be able to tease out a article for it)

Defenses[edit]

Added cite
Snyk is being a bit optimistic here. However, there does seem to be some scope for expansion.

Lead[edit]

 Done
Ditto

Overall[edit]

 Done

@Sohom Datta: I've finished the initial review. I am so sorry for the long delay in getting to all of this. Elli (talk | contribs) 20:04, 9 March 2024 (UTC)[reply]

The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.