Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG]: Clickjacking risk #3843

Closed
CloudEllie opened this issue Sep 9, 2022 · 3 comments
Closed

[BUG]: Clickjacking risk #3843

CloudEllie opened this issue Sep 9, 2022 · 3 comments
Labels
bug Something isn't working

Comments

@CloudEllie
Copy link
Contributor

Describe the bug

The following issue was submitted by a new warden, via the Help Desk. I'm pasting the contents of the help desk submission here.

While performing security testing https://code4rena.com/I have found the vulnerability called Clickjacking.

What is Clickjacking ?
Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a or <iframe>. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.
This vulnerability affects Web Server.

Steps to Reproduce:
Put https://code4rena.com/ url in the code of iframe, which is given below

<title>I Frame</title>

clickjacking vulnerability

<iframe src="https://code4rena.com/" height="550px" width="700px"></iframe>

By Dinesh11

Notice that site is visible in the Iframe

Impact:
This is an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element. This can cause users to unwittingly download malware, visit malicious web pages, provide credentials or sensitive information, transfer money, or purchase products online or Stealing NFTs.
Typically, clickjacking is performed by displaying an invisible page or HTML element, inside an iframe, on top of the page the user sees. The user believes they are clicking the visible page

@CloudEllie CloudEllie added the bug Something isn't working label Sep 9, 2022
@aravindb26
Copy link

aravindb26 commented Sep 11, 2022

Yeah it's me who found this bug in discord to you, dinesh11

@CloudEllie
Copy link
Contributor Author

Confirming this was submitted by warden dinesh11 (@aravindb26 )

@Simon-Busch
Copy link
Contributor

As @aravindb26 opened an issue here : #3861 I'll close this one to avoid duplicates :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

3 participants