Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WalletWebserver is vulnerable to Clickjacking #1

Open
ngpentest007 opened this issue Jul 25, 2019 · 0 comments
Open

WalletWebserver is vulnerable to Clickjacking #1

ngpentest007 opened this issue Jul 25, 2019 · 0 comments

Comments

@ngpentest007
Copy link

Vulnerability: Click-Jacking

Description: Application is vulnerable to a serious front end vulnerability which allows an attacker to access the application by using i-frames with a 0% opacity, the user might not think he is clicking or typing on the website.

"Clickjacking" (that is a subset of the "UI redressing") is a malicious technique that consists of deceiving a web user into interact (in most cases by clicking) on something different to what the user believes he is interacting on. This type of attack, that can be used alone or in combination with other attacks, could potentially send unauthorized commands or reveal confidential information while the victim is interacting on seemingly harmless web pages.

Vulnerable Application: WalletWebserver https://www.myfusionwallet.com

Steps to Reproduce:
1- Use online way to test it:
https://www.lookout.net/test/clickjack.html

Or use the below iframe code to access it

<iframe id="frame" width="100%" height="100%" src="https://www.myfusionwallet.com/"></iframe>

Screenshot:
Clickjacking

Fix: Implement X-Frame-Options: SAMEORIGIN or Deny depends on business requirement

Reference: https://www.owasp.org/index.php/Clickjacking

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant