Subject: | Vulnerable to click jacking |
Date: | Tue, 22 Aug 2017 22:06:13 +0500 |
To: | bug-NCBI [...] rt.cpan.org |
From: | Husnain Iqbal <husnainiqbal02 [...] gmail.com> |
Hello Ncbi,
Iam husnain iqbal,a security researcher.while i was going through your
website i found your website is vulnerable to clickjacking..
heres some description about click jacking..
Typically there is one type of attack - cross site request forgeries (CSRF)
that can interact with functions on other websites.
Clickjacking (User Interface redress attack, UI redress attack, UI
redressing) is a malicious technique of tricking a Web user into clicking
on something different from what the user perceives they are clicking on,
thus potentially revealing confidential information or taking control of
their computer while clicking on seemingly innocuous web pages.
The server didn't return an X-Frame-Options header which means that this
website could be at risk of a clickjacking attack. The X-Frame-Options HTTP
response header can be used to indicate whether or not a browser should be
allowed to render a page in a <frame> or <iframe>. Sites can use this to
avoid clickjacking attacks, by ensuring that their content is not embedded
into other sites.
This vulnerability affects Web Server.
POC
Here are the steps to reproduce the vulnerability
1.open notepad and paste the folloing code
<html>
<head>
<title>Clickjack test page</title>
</head>
<body>
<p>Website is vulnerable to clickjacking!</p>
<iframe src="https://www.ncbi.nlm.nih.gov/account/settings/" width="1247"
height="800"></iframe>
</body>
</html
2.save it as <anyname>.html eg s.html
3.and just simply open that..
As far as i know this data is enough to prove that your site is vulberable
to Clickjacking..
according to OWASP its more than enough..
https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)
SOLUTION:
https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet
check this out..here is the solution for that...
Thanks
Looking after your response
Regards:
Husnain
Message body is not shown because sender requested not to inline it.