Pré-requisitos
The user's browser must have vulnerabilities in its implementation of the same-origin policy. It allows certain data in a loaded page to originate from different servers/domains.
Mitigações
Avoid clicking on untrusted links.
Employ techniques such as frame busting, which is a method by which developers aim to prevent their site being loaded within a frame.
Fraquezas Relacionadas
| CWE-ID |
Nome da Fraqueza |
|
Improper Restriction of Rendered UI Layers or Frames The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with. |
Referências
REF-469
Cross Frame Scripting
https://www.owasp.org/index.php/Cross_Frame_Scripting REF-470
Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites
Gustave Rydstedt, Elie Bursztein, Dan Boneh, and Collin Jackson.
https://seclab.stanford.edu/websec/framebusting/framebust.pdf
Submissão
| Nome |
Organização |
Data |
Data de lançamento |
| CAPEC Content Team |
The MITRE Corporation |
2017-02-01 +00:00 |
|
Modificações
| Nome |
Organização |
Data |
Comentário |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated @Abstraction, Mitigations, Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Example_Instances, Related_Attack_Patterns, Related_Weaknesses |