Analysis:
During the analysis, it was observed that the X-Frame-Options header was not implemented on the application. Due to this an attacker could load the application in an iframe and lure a victim to enter sensitive information. Please refer to the below-provided evidence:
Impact:
An attacker could perform malicious activities on behalf of a user (victim) without his/her knowledge simply by luring the victim to click on a malicious or attacker controller page containing invisible iframe of the vulnerable applications. This vulnerability can be chained with other vulnerabilities besides stealing sensitive information.
Recommendation:
It is recommended to add a DENY and SAMEORIGIN HTTP header in the “X-Frame-Options” in the HTTP response of the application, which will prevent the site from loading inside an Iframe in modern browsers.
Comments
Post a Comment