Voraussetzungen
The user's browser must have vulnerabilities in its implementation of the same-origin policy. It allows certain data in a loaded page to originate from different servers/domains.
Gegenmaßnahmen
Avoid clicking on untrusted links.
Employ techniques such as frame busting, which is a method by which developers aim to prevent their site being loaded within a frame.
Verwandte Schwachstellen
| CWE-ID |
Name der Schwachstelle |
|
Improper Restriction of Rendered UI Layers or Frames The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain. |
Referenzen
REF-469
Cross Frame Scripting
https://www.owasp.org/index.php/Cross_Frame_Scripting REF-470
Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites
Gustave Rydstedt, Elie Bursztein, Dan Boneh, and Collin Jackson.
https://seclab.stanford.edu/websec/framebusting/framebust.pdf
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
| CAPEC Content Team |
The MITRE Corporation |
2017-02-01 +00:00 |
|
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated @Abstraction, Mitigations, Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Example_Instances, Related_Attack_Patterns, Related_Weaknesses |