xmlhttprequest - CSRF via ClickJacking -


Is it possible to execute CSRF through click-junk vulnerability?

Suppose my website is completely safe with CSRF attack but there is no XFO, so there is no way to use CSRF through click-jeking vulnerability?

I have heard about XML that it can be used to use if there is no XFO but CSRF protection, then what is the idea? An X-frame-option response header exists, an attacker can make your page frame and transparent, so when a victim tries to click the button on the attacker's site (like Click here to win an iPad ) They are actually communicating with your page (like click here to initiate a bank transfer ).

It depends on the victim who already has the target site, and it also depends on the availability of one click action on the site. If there is a form of filling which can not be filled out before using the criteria, then this particular attack is probably not possible without giving a trick to fulfill the victim in any way. This creates high risk clickjacking for parameter types, or when only hidden input or JavaScript variables are used.

See OWASP's pages for more information.

Comments

Popular posts from this blog

Verilog Error: output or inout port "Q" must be connected to a structural net expression -

jasper reports - How to center align barcode using jasperreports and barcode4j -

c# - ASP.NET MVC - Attaching an entity of type 'MODELNAME' failed because another entity of the same type already has the same primary key value -