UI Redressing (Clickjacking) vulnerability
Medium
N
Nord Security
Submitted None
Actions:
Reported by
be327e0cff8893bf8ab8592
Vulnerability Details
Technical details and impact analysis
## Summary:
Hello Team,
When i'm testing you're website i have found the vulnerability which called Clickjacking.
## Description:
Clickjacing also know as ( UI redress attack ). By this vulnerability attacker can Hijack the site which is vulnerable by clickjacking.when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.
## Steps To Reproduce:
1. Create a new html file.
2. Put This code <iframe src="https://victim.com" height="550px" width="700px"></iframe>
3. Now save the file and launch on browser.
## PoC:
<!DOCTYPE HTML>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<title>I Frame</title>
</head>
<body>
<h3>clickjacking vulnerability</h3>
<iframe src="https://support.nordvpn.com/?_ga=2.126789129.508245234.1579264319-900411835.1579264319/" height="550px" width="700px"></iframe>
</body>
</html>
## Impact
Using a similar technique keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
UI Redressing (Clickjacking)