Scope | Impact | Likelihood |
---|---|---|
Access Control | Gain Privileges or Assume Identity, Bypass Protection Mechanism, Read Application Data, Modify Application Data Note: An attacker can trick a user into performing actions that are masked and hidden from the user's view. The impact varies widely, depending on the functionality of the underlying application. For example, in a social media application, clickjacking could be used to trik the user into changing privacy settings. |
References | Description |
---|---|
CVE-2017-7440 | E-mail preview feature in a desktop application allows clickjacking attacks via a crafted e-mail message |
CVE-2017-5697 | Hardware/firmware product has insufficient clickjacking protection in its web user interface |
CVE-2017-4015 | Clickjacking in data-loss prevention product via HTTP response header. |
CVE-2016-2496 | Tapjacking in permission dialog for mobile OS allows access of private storage using a partially-overlapping window. |
CVE-2015-1241 | Tapjacking in web browser related to page navigation and touch/gesture events. |
CVE-2017-0492 | System UI in mobile OS allows a malicious application to create a UI overlay of the entire screen to gain privileges. |
The use of X-Frame-Options allows developers of web content to restrict the usage of their application within the form of overlays, frames, or iFrames. The developer can indicate from which domains can frame the content.
The concept of X-Frame-Options is well documented, but implementation of this protection mechanism is in development to cover gaps. There is a need for allowing frames from multiple domains.
A developer can use a "frame-breaker" script in each page that should not be framed. This is very helpful for legacy browsers that do not support X-Frame-Options security feature previously mentioned.
It is also important to note that this tactic has been circumvented or bypassed. Improper usage of frames can persist in the web application through nested frames. The "frame-breaking" script does not intuitively account for multiple nested frames that can be presented to the user.
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-103 | Clickjacking An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system. |
CAPEC-181 | Flash File Overlay An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top of the content, user actions, such as clicks, are caught by the Flash application rather than the underlying HTML. The action is then interpreted by the overlay to perform the actions the attacker wishes. |
CAPEC-222 | iFrame Overlay In an iFrame overlay attack the victim is tricked into unknowingly initiating some action in one system while interacting with the UI from seemingly completely different system. |
CAPEC-504 | Task Impersonation An adversary, through a previously installed malicious application, impersonates an expected or routine task in an attempt to steal sensitive information or leverage a user's privileges. |
CAPEC-506 | Tapjacking An adversary, through a previously installed malicious application, displays an interface that misleads the user and convinces them to tap on an attacker desired location on the screen. This is often accomplished by overlaying one screen on top of another while giving the appearance of a single interface. There are two main techniques used to accomplish this. The first is to leverage transparent properties that allow taps on the screen to pass through the visible application to an application running in the background. The second is to strategically place a small object (e.g., a button or text field) on top of the visible screen and make it appear to be a part of the underlying application. In both cases, the user is convinced to tap on the screen but does not realize the application that they are interacting with. |
CAPEC-587 | Cross Frame Scripting (XFS) This attack pattern combines malicious Javascript and a legitimate webpage loaded into a concealed iframe. The malicious Javascript is then able to interact with a legitimate webpage in a manner that is unknown to the user. This attack usually leverages some element of social engineering in that an attacker must convinces a user to visit a web page that the attacker controls. |
CAPEC-654 | Credential Prompt Impersonation An adversary, through a previously installed malicious application, impersonates a credential prompt in an attempt to steal a user's credentials. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 2.12 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Related_Attack_Patterns, Relationships | |
CWE Content Team | MITRE | updated Applicable_Platforms, Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Detection_Factors, References, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |