Nytro Posted December 20, 2011 Report Posted December 20, 2011 Silly PoCs continue: X-Frame-Options give you less than expectedFrom: Michal Zalewski <lcamtuf () coredump cx> Date: Fri, 16 Dec 2011 11:21:49 -0800[ Resubmitting - I think the original post did not go through lastweek, but some of the responses did, so probably an accident. ]---I think we greatly underappreciate the extent to which JavaScriptallows you to exploit the limits of human perception. On modernhigh-performance systems, windows can be opened, positioned, andclosed; and documents loaded and then navigated away from; so quicklythat we can't even reliably notice that, let alone react consciously.The PoC I posted here earlier this week(Beaver Peak Banking and BBQ) demonstrates one example of pagetransitions occurring so fast that you don't register it; and some ofmy earlier posts outlined the exploitation of page switching toexploit browser UIs (e.g. http://lcamtuf.coredump.cx/ffgeo2/). Today,I wanted to share this brief demonstration of an attack that shouldhopefully illustrate why our current way of thinking aboutclickjacking (and the possible defenses, such as X-Frame-Options) isflawed:http://lcamtuf.coredump.cx/clickit/The basic idea here is that instead of placing the UI you want totamper with in an invisible or only partly-visible <iframe>, you canachieve a similar effect simply by predicting the time of apremeditated click (which is fairly easy if you look at mouse velocityand distance to the expected destination), and then either destroyingthe current window, or navigating to a different document (in thiscase, a cheesy banking site).While everything about this exploit is extremely goofy, and I put noeffort into making the transitions less obvious, it should stilldemonstrate the issue neatly./mzSursa: Bugtraq: silly PoCs continue: X-Frame-Options give you less than expected Quote