CAPEC-587

Cross Frame Scripting (XFS)
Hoog
Draft
2017-02-01
00h00 +00:00
2023-01-24
00h00 +00:00
Melding voor een CAPEC
Blijf op de hoogte van wijzigingen voor een specifieke CAPEC.
Meldingen beheren

Beschrijvingen CAPEC

This attack pattern combines malicious Javascript and a legitimate webpage loaded into a concealed iframe. The malicious Javascript is then able to interact with a legitimate webpage in a manner that is unknown to the user. This attack usually leverages some element of social engineering in that an attacker must convinces a user to visit a web page that the attacker controls.

Informatie CAPEC

Vereisten

The user's browser must have vulnerabilities in its implementation of the same-origin policy. It allows certain data in a loaded page to originate from different servers/domains.

Mitigaties

Avoid clicking on untrusted links.
Employ techniques such as frame busting, which is a method by which developers aim to prevent their site being loaded within a frame.

Gerelateerde zwakheden

CWE-ID Zwakheidsnaam

CWE-1021

Improper Restriction of Rendered UI Layers or Frames
The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.

Referenties

REF-469

Cross Frame Scripting
https://www.owasp.org/index.php/Cross_Frame_Scripting

REF-470

Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites
Gustave Rydstedt, Elie Bursztein, Dan Boneh, and Collin Jackson.
https://seclab.stanford.edu/websec/framebusting/framebust.pdf

Indiening

Naam Organisatie Datum Releasedatum
CAPEC Content Team The MITRE Corporation 2017-02-01 +00:00

Wijzigingen

Naam Organisatie Datum Opmerking
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Attack_Patterns
CAPEC Content Team The MITRE Corporation 2020-12-17 +00:00 Updated @Abstraction, Mitigations, Taxonomy_Mappings
CAPEC Content Team The MITRE Corporation 2023-01-24 +00:00 Updated Example_Instances, Related_Attack_Patterns, Related_Weaknesses