Loading HuntDB...

UI Redressing (Clickjacking) vulnerability

Medium
N
Nord Security
Submitted None

Vulnerability Details

Technical details and impact analysis

UI Redressing (Clickjacking)
## Summary: Hello Team, When i'm testing you're website i have found the vulnerability which called Clickjacking. ## Description: Clickjacing also know as ( UI redress attack ). By this vulnerability attacker can Hijack the site which is vulnerable by clickjacking.when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. ## Steps To Reproduce: 1. Create a new html file. 2. Put This code <iframe src="https://victim.com" height="550px" width="700px"></iframe> 3. Now save the file and launch on browser. ## PoC: <!DOCTYPE HTML> <html lang="en-US"> <head> <meta charset="UTF-8"> <title>I Frame</title> </head> <body> <h3>clickjacking vulnerability</h3> <iframe src="https://support.nordvpn.com/?_ga=2.126789129.508245234.1579264319-900411835.1579264319/" height="550px" width="700px"></iframe> </body> </html> ## Impact Using a similar technique keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

UI Redressing (Clickjacking)