Skip to content
This repository has been archived by the owner on Jun 11, 2024. It is now read-only.

Security, XSS attack with iframe bypassing weak same-origin-policy #3

Closed
fix opened this issue Mar 16, 2016 · 0 comments
Closed

Security, XSS attack with iframe bypassing weak same-origin-policy #3

fix opened this issue Mar 16, 2016 · 0 comments
Assignees
Milestone

Comments

@fix
Copy link
Contributor

fix commented Mar 16, 2016

If in your dapp index.html you include this single frame

<iframe name="attackit" src="/"></iframe>

The dapp has access to the main dashboard using for instance:

$('[ui-sref="main.contacts"]', frames['attackit'].document)

And basically script whatever action in the LISK dashboard...

It is possible to prevent this by using a combination of those ideas:
http://stackoverflow.com/questions/2896623/how-to-prevent-my-site-page-to-be-loaded-via-3rd-party-site-frame-of-iframe

@karmacoma karmacoma self-assigned this Mar 16, 2016
@karmacoma karmacoma added this to the Mainnet Launch milestone Mar 16, 2016
karmacoma pushed a commit that referenced this issue Apr 10, 2016
Denying <frame>, <iframe>, <object>, <embed> or <applet>.
Isabello pushed a commit that referenced this issue May 2, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants