Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
247 views1 page

Clickjacking Vulnerability Report

The document reports that the security team found a clickjacking vulnerability on their website that affects multiple URLs, which involves tricking users into clicking on something different than they intend by disguising malicious pages within an iframe, and provides steps to reproduce this vulnerability including example vulnerable URLs and a proof-of-concept iframe code sample. The vulnerability allows confidential information to potentially be revealed or computer control to be taken when users are clicking on seemingly innocuous pages due to the lack of an X-Frame-Options header.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
247 views1 page

Clickjacking Vulnerability Report

The document reports that the security team found a clickjacking vulnerability on their website that affects multiple URLs, which involves tricking users into clicking on something different than they intend by disguising malicious pages within an iframe, and provides steps to reproduce this vulnerability including example vulnerable URLs and a proof-of-concept iframe code sample. The vulnerability allows confidential information to potentially be revealed or computer control to be taken when users are clicking on seemingly innocuous pages due to the lack of an X-Frame-Options header.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

Hi team,

While performing security testing of your website i have found the vulnerability
called Clickjacking.
Many URLS are in scope and vulnerable to Clickjacking.

What is Clickjacking ?
Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a
malicious technique of tricking a Web user into clicking on something different
from what the user perceives they are clicking on, thus potentially revealing
confidential information or taking control of their computer while clicking on
seemingly innocuous web pages.
The server didn't return an X-Frame-Options header which means that this website
could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header
can be used to indicate whether or not a browser should be allowed to render a page
in a <frame> or <iframe>. Sites can use this to avoid clickjacking attacks, by
ensuring that their content is not embedded into other sites.
This vulnerability affects Web Server.

Steps to Reproduce / POC

Vulnerable Urls:
https://ylands.com/
https://workshop.ylands.com/
https://dayz.com/
http://armamobileops.com/
https://minidayz.com/
Put every above url one by one in the code of iframe, which is given below

<!DOCTYPE HTML>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<title>I Frame</title>
</head>
<body>
<h3>clickjacking vulnerability</h3>
<iframe src="https://vigorgame.com/" height="550px" width="700px"></iframe>
</body>
</html>

By Tahir Javed
[email protected]

Notice that site is visible in the Iframe

POC is in the attachments. Thanks, waiting for your response.


Impact

Using a similar technique, keystrokes can also be hijacked. With a carefully


crafted combination of stylesheets, iframes, and text boxes, a user can be led to
believe they are typing in the password to their email or bank account, but are
instead typing into an invisible frame controlled by the attacker.

You might also like