...
...
...
...
...
...
...
...
...
...
...
Clickjacking
Content Security Policy
- Content Security Policy Reference Guide
- OWASP Cheat Sheet on Content Security Policy
- W3C working draft of Content Security Policy Level 3
Background
Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker. [OWASP-CJ]
edX examples
- Imagine a legitimate-looking web site with a button that says "click here for more information". However, there's a hidden iframe loaded with the edX account settings page that is lined up exactly so that the "Reset Your Password" button is directly on top of the "more information" button. When a victim clicks on the supposed "more information" button, they will actually click on the invisible "Reset Your Password" button.
Protection
References
Clickjacking
- [OWASP-CJ] OWASP page on Clickjacking
- [OWASP-CJ-CS] OWASP Cheat Sheet on Clickjacking Defense