{"id":699,"date":"2008-11-08T02:16:38","date_gmt":"2008-11-08T07:16:38","guid":{"rendered":"http:\/\/alsplace.aldenbaker.com\/alsplace\/security\/699\/clickjacking-researchers-raise-alert-for-scary-new-cross-browser-exploit\/"},"modified":"2008-11-08T02:16:38","modified_gmt":"2008-11-08T07:16:38","slug":"clickjacking-researchers-raise-alert-for-scary-new-cross-browser-exploit","status":"publish","type":"post","link":"http:\/\/alsplace.info\/?p=699","title":{"rendered":"Clickjacking: Researchers raise alert for scary new cross-browser exploit"},"content":{"rendered":"\n<!-- ALL ADSENSE ADS DISABLED -->\n<h4 align=\"justify\">September 25th, 2008 <!-- by Ryan Naraine --><\/h4>\n<p class=\"meta\" align=\"justify\">Posted by Ryan Naraine<\/p>\n<p class=\"meta\" align=\"justify\">[ <strong>UPDATE<\/strong>: See <a href=\"http:\/\/blogs.zdnet.com\/security\/?p=1973\"><font color=\"#004d99\">e-mail from NoScript creator Giorgio Maone<\/font><\/a> on a possible mitigation ]<\/p>\n<p align=\"justify\">Researchers are beginning to raise an alarm for what looks like a scary new browser exploit\/threat affecting all the major desktop platforms &mdash; Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Adobe Flash.<\/p>\n<p align=\"justify\">The threat, called Clickjacking, was to be discussed at the OWASP NYC AppSec 2008 Conference but, at the <a href=\"http:\/\/blogs.adobe.com\/psirt\/2008\/09\/thanks_to_jeremiah_grossman_an.html\"><font color=\"#004d99\">request of Adobe<\/font><\/a> and other affected vendors, the talk was nixed until a comprehensive fix is ready.<\/p>\n<p align=\"justify\">The two researchers behind the discovery &mdash; Robert Hansen (left) and Jeremiah Grossman &mdash; have released <a href=\"http:\/\/ha.ckers.org\/blog\/20080915\/clickjacking\/\"><font color=\"#004d99\">droplets<\/font><\/a> of <a href=\"http:\/\/jeremiahgrossman.blogspot.com\/2008\/09\/cancelled-clickjacking-owasp-appsec.html\"><font color=\"#004d99\">information <\/font><\/a>to highlight the severity of this issue.<\/p>\n<p align=\"justify\">So, what exactly is Clickjacking?<\/p>\n<p align=\"justify\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/blogs.zdnet.com\/security\/images\/clickjack_rsnake.png\" border=\"1\" alt=\"Clickjacking details emerge\" width=\"456\" height=\"132\" align=\"absMiddle\" \/><\/p>\n<p align=\"justify\">According to someone who attended the semi-restricted OWASP presentation, <a href=\"http:\/\/www.webadminblog.com\/index.php\/2008\/09\/24\/new-0day-browser-exploit-clickjacking-owasp-appsec-nyc-2008\/\"><font color=\"#004d99\">the issue is indeed zero-day<\/font><\/a>, affects all the different browsers and has nothing to do with JavaScript:<\/p>\n<ul>\n<li>\n<div align=\"justify\"><em>In a nutshell, it&rsquo;s when you visit a malicious website and the attacker is able to take control of the links that your browser visits.&nbsp; The problem affects all of the different browsers except something like lynx.&nbsp; The issue has nothing to do with JavaScript so turning JavaScript off in your browser will not help you.&nbsp; It&rsquo;s a fundamental flaw with the way your browser works and cannot be fixed with a simple patch.&nbsp; With this exploit, once you&rsquo;re on the malicious web page, the bad guy can make you click on any link, any button, or anything on the page without you even seeing it happening.<\/em><\/div>\n<\/li>\n<\/ul>\n<p align=\"justify\"><strong>[ SEE: <a href=\"http:\/\/blogs.zdnet.com\/security\/?p=1733\" title=\"Permanent Link to Adobe Flash ads launching clipboard hijack attack\"><font color=\"#004d99\">Adobe Flash ads launching clipboard hijack attack<\/font><\/a> ]<\/strong><\/p>\n<p align=\"justify\">If that&rsquo;s not scary enough, consider than the average end user would have no idea what&rsquo;s going on during a Clickjack attack.<\/p>\n<ul>\n<li>\n<div align=\"justify\"><em>Ebay, for example, would be vulnerable to this since you could embed javascript into the web page, although, javascript is not required to exploit this.&nbsp; &ldquo;It makes it easier in many ways, but you do not need it.&rdquo;&nbsp; Use lynx to protect yourself and don&rsquo;t do <a href=\"http:\/\/valasevich.com\/\">cialis 40 mg<\/a>  dynamic anything.&nbsp; You can &ldquo;sort of&rdquo; fill out forms and things like that.&nbsp; The exploit requires DHTML.&nbsp; Not letting yourself be framed (framebusting code) will prevent cross-domain clickjacking, but an attacker can still force you to click any links on their page.&nbsp; Each click by the user equals a clickjacking click so something like a flash game is perfect bait. <\/em><\/div>\n<\/li>\n<\/ul>\n<p align=\"justify\">According to Hansen, the threat scenario was discussed with both Microsoft and Mozilla and they concur independently that this is a tough problem with no easy solution at the moment.<\/p>\n<p align=\"justify\">Grossman confirmed that the latest versions of Internet Explorer (including version 8) and Firefox 3 are affected.<\/p>\n<ul>\n<li>\n<div align=\"justify\"><em>In the meantime, the only fix is to disable browser scripting and plugins. We realize this doesn&rsquo;t give people much technical detail to go on, but it&rsquo;s the best we can do right now. <\/em><\/div>\n<\/li>\n<\/ul>\n<!-- Social Bookmarks BEGIN -->\n<div class=\"social_bookmark\">\n<a title=\"Click me to see the sites.\" href=\"#\" onclick=\"$$('div.d699').each( function(e) { e.visualEffect('slide_down',{duration:2.5}) }); return false;\"><strong><em>Bookmark to:<\/em><\/strong><\/a>\n<br \/>\n<div class=\"d699\" style=\"overflow:hidden\">\n<br \/>\n<br \/>\n<a style=\"font-size:90%;text-align: right; \" title=\"Click me to hide the sites.\" href=\"#\" onclick=\"$$('div.d699').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); return false;\">Hide Sites<\/a>\n<\/div>\n<\/div>\n<!-- Social Bookmarks END -->\n<script type=\"text\/javascript\">$$('div.d699').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); <\/script>","protected":false},"excerpt":{"rendered":"<p>September 25th, 2008 Posted by Ryan Naraine [ UPDATE: See e-mail from NoScript creator Giorgio Maone on a possible mitigation ] Researchers are beginning to raise an alarm for what looks like a scary new browser exploit\/threat affecting all the major desktop platforms &mdash; Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Adobe Flash. [&hellip;]<\/p>\n<!-- Social Bookmarks BEGIN -->\n<div class=\"social_bookmark\">\n<a title=\"Click me to see the sites.\" href=\"#\" onclick=\"$$('div.d699').each( function(e) { e.visualEffect('slide_down',{duration:2.5}) }); return false;\"><strong><em>Bookmark to:<\/em><\/strong><\/a>\n<br \/>\n<div class=\"d699\" style=\"overflow:hidden\">\n<br \/>\n<br \/>\n<a style=\"font-size:90%;text-align: right; \" title=\"Click me to hide the sites.\" href=\"#\" onclick=\"$$('div.d699').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); return false;\">Hide Sites<\/a>\n<\/div>\n<\/div>\n<!-- Social Bookmarks END -->\n<script type=\"text\/javascript\">$$('div.d699').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); <\/script>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[26],"tags":[],"_links":{"self":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts\/699"}],"collection":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=699"}],"version-history":[{"count":0,"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts\/699\/revisions"}],"wp:attachment":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=699"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}