Hi zusammen,
ich hab heute morgen eine Mail bekommen, die erstmal echt aussieht. Einfach, weil es einfach keinen Link drinnen gibt den man fürs Phishing verwenden könnte.
Und zum Stichwort "Clickjacker" habe ich hier nichts gefunden.
Dabei ist noch ein Screenshot von "Clickjacker.io" wo man die Sicherheitslücke (?) auf unserer Seite bestätigen kann.
Sorgen mach ich mir aber, weil bei dem Test vom JTL- Shop selbst alles grün ist:
https://clickjacker.io/test?url=https://www.jtl-software.de/jtl-store/tarife-amazon-ebay-anbindung
Meiner ist rot
ich hab heute morgen eine Mail bekommen, die erstmal echt aussieht. Einfach, weil es einfach keinen Link drinnen gibt den man fürs Phishing verwenden könnte.
Und zum Stichwort "Clickjacker" habe ich hier nichts gefunden.
Hi team
I have found a bug in your website
Bug type : UI Redressing
Impact : Phishing (account compromise)
Description :
Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.
POC:
<html>
<body>
<h1> Website is vulnerable to clickjacking<h1>
<iframe width =100% height=80% src ="https:// unserwebshop /"></iframe>
</body>
</html>
Impact:
The site can also be opened in an iframe after the user has logged it making it hard for the user to avoid phishing.A user can be tricked into entering his credentials in what may be the placeholder for the original website details. And thus his credentials would be sent to the attacker. Furthermore the Payment page is also vulnerable to UI redressing Allowing for an attacker to gain access to the users payment credentials.
Remediation :
Add an iframe destroyer in the header of the page . Also if you would like for your website to open is specified Iframe origin headers then you can define the Origin headers for those websites or origins.
Note :
I am also attaching a screenshot as proof of concept. Furthermore its not just the login page that is affected by this vulnerability.
waiting for your response
Regards
Dabei ist noch ein Screenshot von "Clickjacker.io" wo man die Sicherheitslücke (?) auf unserer Seite bestätigen kann.
Sorgen mach ich mir aber, weil bei dem Test vom JTL- Shop selbst alles grün ist:
https://clickjacker.io/test?url=https://www.jtl-software.de/jtl-store/tarife-amazon-ebay-anbindung
Meiner ist rot