Conditions préalables
The user's browser must have vulnerabilities in its implementation of the same-origin policy. It allows certain data in a loaded page to originate from different servers/domains.
Atténuations
Avoid clicking on untrusted links.
Employ techniques such as frame busting, which is a method by which developers aim to prevent their site being loaded within a frame.
Faiblesses connexes
| CWE-ID |
Nom de la faiblesse |
|
Improper Restriction of Rendered UI Layers or Frames The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain. |
Références
REF-469
Cross Frame Scripting
https://www.owasp.org/index.php/Cross_Frame_Scripting REF-470
Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites
Gustave Rydstedt, Elie Bursztein, Dan Boneh, and Collin Jackson.
https://seclab.stanford.edu/websec/framebusting/framebust.pdf
Soumission
| Nom |
Organisation |
Date |
Date de publication |
| CAPEC Content Team |
The MITRE Corporation |
2017-02-01 +00:00 |
|
Modifications
| Nom |
Organisation |
Date |
Commentaire |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated @Abstraction, Mitigations, Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Example_Instances, Related_Attack_Patterns, Related_Weaknesses |