Loading HuntDB...

Clickjacking docs.weblate.org

Low
W
Weblate
Submitted None
Reported by akbarparambil

Vulnerability Details

Technical details and impact analysis

Hi, Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a <frame> or <iframe>. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites. This vulnerability affects Web Server. POC Here are th steps to reproduce the vulnerability 1.save the below file as anything.html and run it u can see its vulnerable to clickjacking <html> <head> <title>Clickjack test page</title> </head> <body> <p>Website is vulnerable to clickjacking!</p> <iframe src="http://docs.weblate.org" width="500" height="500"></iframe> </body> </html> As far as i know this data is enough to prove that your site is vulberable to Clickjacking.. according to OWASP its more than enough.. https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004) Solution https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted