Hi, all!

Just want to inform you that I have added very simple grep plugin [0] 
for possible ClickJacking [1] attack detection. Tests also have been 
added[2]. Principle of check is try to find X-Frame-Options header in 
response. If no such header then URL is vulnerable. Current TODO is to 
add cookie check because in wild world target of such attacks is action 
of **authorized** user in vulnerable web application. Comments are 
welcome! :)

>> 1.ClickJacking& Phishing by mixing layers and iframe
> We can code grep plugin to detect such flaws.
> Logic is very simple - if response is text_or_html and hasn't
> X-Frame-Options header then we can consider that such response is
> vulnerable to framing -> ClickJacking [0]. I know about frame breaking
> scripts but, imho, currently this header is the best solution.

[0] 
http://w3af.svn.sourceforge.net/viewvc/w3af/branches/csrf/plugins/grep/clickJacking.py
[1] https://www.owasp.org/index.php/Clickjacking
[2] 
w3af.svn.sourceforge.net/viewvc/w3af/branches/csrf/extras/testEnv/webroot/w3af/grep/clickjacking/

-- 
Taras
http://oxdef.info

------------------------------------------------------------------------------
This SF email is sponsosred by:
Try Windows Azure free for 90 days Click Here 
http://p.sf.net/sfu/sfd2d-msazure
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to