[MacPorts] #62680: UI Redressing leads to perform unauthenticated Actions
MacPorts
noreply at macports.org
Mon Apr 12 16:19:27 UTC 2021
#62680: UI Redressing leads to perform unauthenticated Actions
-------------------------+--------------------
Reporter: ImPRINCE99 | Owner: (none)
Type: defect | Status: new
Priority: High | Milestone:
Component: website | Version:
Resolution: | Keywords:
Port: |
-------------------------+--------------------
Comment (by ImPRINCE99):
Respected Team,
As this Vulnerability not only affect on the forms, but also it affect on
your Login page, Your ticket chat box etc.
So, to secure this flaw I would really recommend to see some below
prevention techniques:
• Framebusting or framebreaking: Before support for new HTTP headers
became widespread, website developers were on their own and had to deploy
special framebuster (or framekiller) scripts to prevent their pages from
being framed. The first framebusting scripts simply checked top.location
to make sure this was the current page – if not, top.location was set to
self. However, these scripts could easily be blocked from the outer frame
or otherwise bypassed, and more elaborate solutions were developed. Even
so, numerous ways of bypassing even the most elaborate framebreakers
exist, and such scripts should only be used to provide rudimentary
protection for legacy browsers. The approach currently recommended by
OWASP is to hide the entire body of the HTML document and only show it
after verifying that the page is not framed.
• X-Frame-Options: Probably the best solution at present is to use
the X-Frame-Options (XFO) HTTP response header in server responses.
Originally introduced by Microsoft in Internet Explorer 8 and later
formalized in RFC 7034, the X-Frame-Options header is used to specify
whether a page can be embedded in a <frame>, <iframe>, <embed> or <object>
element. The header supports three possible directives: deny to block all
framing attempts, sameorigin to allow framing only by pages of the same
origin, or allow-from to allow framing by pages from specified URIs.
However, allow-from is unsupported by several browsers (including Chrome
and Safari), so if you need to specify sources, you are better off using
CSP (see below). For general anti-framing protection, you only need to
specify X-Frame-Options: deny or X-Frame-Options: sameorigin in your
server’s headers.
• Content-Security-Policy with frame-ancestors: The Content-
Security-Policy HTTP header (CSP) was initially developed to protect
against XSS and other data injection attacks. However, it also provides a
frame-ancestors directive for specifying sources that are permitted to
embed a page (in a <frame>, <iframe>, <object>, <embed>, or <applet>
element). The syntax is simple:
Proof Of Concept(PoC): please see the attached Video
--
Ticket URL: <https://trac.macports.org/ticket/62680#comment:2>
MacPorts <https://www.macports.org/>
Ports system for macOS
More information about the macports-tickets
mailing list