Loading HuntDB...

Clickjacking to change email address

High
G
Gener8
Submitted None
Reported by paramdham

Vulnerability Details

Technical details and impact analysis

UI Redressing (Clickjacking)
##Summary Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. It allows remote attackers to do some clickjacking which can be used for adding arbitrary tasks . Why? Almost all of your page has missing X-FRAME-OPTIONS header. Websites are at risk of a clickjacking attack when they allow content to be embedded within a frame. ##Proof of concept code :- Copy the above code and paste it in notepad and save it with .html extention and open it in browser <html> <head> <title>Clickjack test page</title> </head> <body> <p>Website is vulnerable to clickjacking!</p> <iframe src="https://gener8ads.com/dashboard/account" sandbox="allow-top-navigation allow-same-origin allow-scripts" width="500" height="500"></iframe> </body> </html> Copy and paste above given code and save it with hack.html and open it in browser -------------------------------------------------------------------> Recommendation :- Add X-FRAME-OPTIONS header to mitigate the issue ## Impact An attacker may use this risk to invisibly load the target website into their own site and trick users into clicking on links which they never intended to. An "X-Frame-Options" header should be sent by the server to either deny framing of content, only allow it from the same origin or allow it from a trusted URIs.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

UI Redressing (Clickjacking)