Clickjacking
None
K
Kubernetes
Submitted None
Actions:
Reported by
hackerboy404
Vulnerability Details
Technical details and impact analysis
Report Submission Form
## Summary:
Clickjacking is an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element
##Description:
Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a <frame> or <iframe>. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.
##Steps to Reproduce:
1. Go to https://kubernetes.io/
2. Generate a HTML code for testing
<!DOCTYPE HTML>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<title>I Frame</title>
</head>
<body>
<h3>clickjacking vulnerability</h3>
<iframe src="https://kubernetes.io/" height="550px" width="700px"></iframe>
</body>
</html>
Note :- Mostly clickjacking is work on login pages but site dosent have any login page but attacker can steal user credential by manipulating user
## Impact
The hacker selected the UI Redressing (Clickjacking) weakness. This vulnerability type requires contextual information from the hacker. They provided the following answers
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
UI Redressing (Clickjacking)