Back to list
...because you can't get enough of clickjacking
Mar 13 2010 06:28AM
Michal Zalewski (lcamtuf coredump cx)
[ I promise to post something more interesting shortly - but in the
meantime, I wanted to drop a quick note about something kinda amusing.
There was a considerable amount of buzz around clickjacking  in the
past year or so. It is commonly believed that this simple attack can
only be realistically employed to exploit one-click UI actions. Alas,
a related vector is generally overlooked: JS focus semantics - a
source of considerable amount of grief in the past  - can be abused
to execute multi-step attacks by altering focus between a hidden frame
and the edited document while the user is simply typing something in.
No need for pixel-accurate positioning of the target, too.
Consider this whimsical proof-of-concept exploit (works on Windows,
WebKit-based browsers only):
It's not very serious, but more cuter than clickjacking proper. WebKit
focus behavior on Windows makes this particular PoC easier there, but
I believe that no browser is designed to counter this general attack
pattern in any particular way. The usual opt-in mitigations
(X-Frame-Options, frame busting) should offer a reasonable degree of
 http://lcamtuf.coredump.cx/focusbug/ and so forth
[ reply ]
Copyright 2010, SecurityFocus