Clickjacking

I have found this article in my ZDNet newsletter - it is of concern as we are all too trusting!


Clickjacking: Researchers raise alert for scary new cross-browser exploit | Zero Day | ZDNet.com

Researchers are beginning to raise an alarm for what looks like a scary new browser exploit/threat affecting all the major desktop platforms — Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Adobe Flash.

The threat, called Clickjacking, was to be discussed at the OWASP NYC AppSec 2008 Conference but, at the request of Adobe and other affected vendors, the talk was nixed until a comprehensive fix is ready.

The two researchers behind the discovery — Robert Hansen and Jeremiah Grossman — have released droplets of information to highlight the severity of this issue.

So, what exactly is Clickjacking?



According to someone who attended the semi-restricted OWASP presentation, the issue is indeed zero-day, affects all the different browsers and has nothing to do with JavaScript:

In a nutshell, it’s when you visit a malicious website and the attacker is able to take control of the links that your browser visits. The problem affects all of the different browsers except something like lynx. The issue has nothing to do with JavaScript so turning JavaScript off in your browser will not help you. It’s a fundamental flaw with the way your browser works and cannot be fixed with a simple patch. With this exploit, once you’re on the malicious web page, the bad guy can make you click on any link, any button, or anything on the page without you even seeing it happening.
[ SEE: Adobe Flash ads launching clipboard hijack attack ]

If that’s not scary enough, consider than the average end user would have no idea what’s going on during a Clickjack attack.

Ebay, for example, would be vulnerable to this since you could embed javascript into the web page, although, javascript is not required to exploit this. “It makes it easier in many ways, but you do not need it.” Use lynx to protect yourself and don’t do dynamic anything. You can “sort of” fill out forms and things like that. The exploit requires DHTML. Not letting yourself be framed (framebusting code) will prevent cross-domain clickjacking, but an attacker can still force you to click any links on their page. Each click by the user equals a clickjacking click so something like a flash game is perfect bait.
According to Hansen, the threat scenario was discussed with both Microsoft and Mozilla and they concur independently that this is a tough problem with no easy solution at the moment.

Grossman confirmed that the latest versions of Internet Explorer (including version 8) and Firefox 3 are affected.

In the meantime, the only fix is to disable browser scripting and plugins. We realize this doesn’t give people much technical detail to go on, but it’s the best we can do right now.
 
I wish they wouldn't publish articles like this. Since there is no "fix", "patch" or "update" at this time it will just freak people out. Just stay away from the porn sites and don't click on any banners. The internet will never be 100% secure.
 

My Computer

System One

  • CPU
    HP Pavilion dv6604nr
Yeah the bigger they make the issue the more people find out and maybe more "hackers" are willing to get in on this....

It does suck and I hope EE and FF fix this somehow. Has to be a fix its only code lol.
 

My Computer

System One

  • Manufacturer/Model
    Asus Laptop's = the best by far!
    CPU
    Intel core 2 duo 2.5gig
    Motherboard
    Asus
    Memory
    4gigs DDR2
    Graphics card(s)
    Nvidia 9500m Gs 512mb
    Monitor(s) Displays
    15.4" laptop screen and 19" external
    Screen Resolution
    1440x900 and 1280x1224
    Hard Drives
    250 in the laptop, 750gig external
Who knows it may only be a threat to first time computer users, but then thats been true for a long time so maybe its nothing to worry about for intermediate/experienced users.
 

My Computer

System One

  • Manufacturer/Model
    Self built
    CPU
    Intel E8400 3GHz
    Motherboard
    Intel DX48BT2
    Memory
    Kingston PC3-10666 4Gb
    Graphics card(s)
    XFX 9800 GTX XXX
    Sound Card
    Soundblaster X-Fi XtremeMusic
    Monitor(s) Displays
    2x Samsung SM-T220HD 22"
    Screen Resolution
    1680x1050 on two monitors
    Hard Drives
    WD Raptor X/150Gb in RAID0 WD Raptor 36gb 3x Samsung F1 1Tb
    PSU
    Thermaltake ToughPower 850w
    Case
    Thermaltake Armor
    Cooling
    Tuniq Tower 120
    Mouse
    Razer Diamondback 3G
    Keyboard
    Dell Multimedia Enhanced USB
    Internet Speed
    8128/832
    Other Info
    Thermaltake Muse esata caddy
You are quite right of course the more experienced you are the less chance of doing something 'crazy', but then that is why there are forums such as Vista Forums - to help the experienced and inexperienced and to share that which might do harm as per the above article.
 

My Computer

System One

  • Manufacturer/Model
    Acer Aspire 5920gmi notebook
    CPU
    Intel Core 2 Duo T7300 2.00GHz
    Memory
    4GB
    Graphics card(s)
    NVIDIA GeForce 8600M GS
    Sound Card
    Realtek
    Screen Resolution
    1280 x 800 x 4294967296 colors
    Internet Speed
    crawl
Its things like this that make me feel better about UAC preventing IE and FF from getting full permissions to the OS and thus preventing the entire PC from being compromised and instead only one application ;)
 

My Computer

Perhaps an article about this and what to do to prevent it might be an idea.
 

My Computer

System One

  • Manufacturer/Model
    Self built
    CPU
    Intel E8400 3GHz
    Motherboard
    Intel DX48BT2
    Memory
    Kingston PC3-10666 4Gb
    Graphics card(s)
    XFX 9800 GTX XXX
    Sound Card
    Soundblaster X-Fi XtremeMusic
    Monitor(s) Displays
    2x Samsung SM-T220HD 22"
    Screen Resolution
    1680x1050 on two monitors
    Hard Drives
    WD Raptor X/150Gb in RAID0 WD Raptor 36gb 3x Samsung F1 1Tb
    PSU
    Thermaltake ToughPower 850w
    Case
    Thermaltake Armor
    Cooling
    Tuniq Tower 120
    Mouse
    Razer Diamondback 3G
    Keyboard
    Dell Multimedia Enhanced USB
    Internet Speed
    8128/832
    Other Info
    Thermaltake Muse esata caddy
I don't really see how bad of a risk this could be... You can't get your computer infected by simply clicking on a link. Unless this Clickjacker can also make you click on the file it (possibly) downloads to your computer then there aren't really any issues.
 

My Computer

System One

  • Manufacturer/Model
    Acropolis
    CPU
    Intel Core i7-6800k @ 4.0 GHz
    Motherboard
    ASUS X99-M WS
    Memory
    32GB Corsair Vengeance 2x16GB
    Graphics card(s)
    ASUS GeForce GTX 1080 STRIX
    Monitor(s) Displays
    ASUS ROG Swift PG278Q
    Screen Resolution
    2560x1440
    Hard Drives
    2x 256GB Samsung 850 Pro (RAID 0) 1x 500GB Samsung 850 Evo 2x Western Digital RED 4TB (RAID 1) 50TB File Server (Multiple RAID 6)
    PSU
    Corsair AX1200i
    Case
    Corsair Air 240
    Mouse
    Logitech G502
    Keyboard
    Razer Blackwidow X Chroma
    Internet Speed
    250Mbps Down | 15 Mbps Up
Freelancer, read the following again -

'In a nutshell, it’s when you visit a malicious website and the attacker is able to take control of the links that your browser visits. The problem affects all of the different browsers except something like lynx. The issue has nothing to do with JavaScript so turning JavaScript off in your browser will not help you. It’s a fundamental flaw with the way your browser works and cannot be fixed with a simple patch. With this exploit, once you’re on the malicious web page, the bad guy can make you click on any link, any button, or anything on the page without you even seeing it happening.'

And not everybody knows when they are visiting a malicious website anymore.
 
Last edited:

My Computer

System One

  • Manufacturer/Model
    Acer Aspire 5920gmi notebook
    CPU
    Intel Core 2 Duo T7300 2.00GHz
    Memory
    4GB
    Graphics card(s)
    NVIDIA GeForce 8600M GS
    Sound Card
    Realtek
    Screen Resolution
    1280 x 800 x 4294967296 colors
    Internet Speed
    crawl
Freelancer, read the following again -

'In a nutshell, it’s when you visit a malicious website and the attacker is able to take control of the links that your browser visits. The problem affects all of the different browsers except something like lynx. The issue has nothing to do with JavaScript so turning JavaScript off in your browser will not help you. It’s a fundamental flaw with the way your browser works and cannot be fixed with a simple patch. With this exploit, once you’re on the malicious web page, the bad guy can make you click on any link, any button, or anything on the page without you even seeing it happening.'

And not everybody knows when they are visiting a malicious website anymore.

Perhaps an article about this and what to do to prevent it might be an idea.


Swarfega,

The 64bit FF and IE7/8 dont have the same flaw ;)
 

My Computer

Update on the above

Firefox + NoScript vs Clickjacking | Zero Day | ZDNet.com

Firefox + NoScript vs Clickjacking

In response to my story earlier on the cross-browser Clickjacking exploit/threat, I received the following e-mail from Giorgio Maone, creator of the popular Firefox NoScript plug-in:

Hi Ryan,

I’ve seen a lot of speculation and confusion in the comments to your Clickjacking article about NoScript not being able to mitigate [the issue].

I had access to detailed information about how this attack works and I can tell you the following:

It’s really scary
NoScript in its default configuration can defeat most of the possible attack scenarios (i.e. the most practical, effective and dangerous) — see this comment by Jeremiah Grossman himself.
For 100% protection by NoScript, you need to check the “Plugins|Forbid <IFRAME>” option.
Cheers,
Giorgio

I also received private confirmation from a high-level source at an affected vendor about the true severity of this issue. In a nutshell, I was told that it’s indeed “very, freaking scary” and “near impossible” to fix properly.

Tod Beardsley from BreakingPoint has posted a few proof-of-concept exploits with speculation around clickjacking.
http://www.breakingpointsystems.com/community/blog/clickjacking
 

My Computer

System One

  • Manufacturer/Model
    Acer Aspire 5920gmi notebook
    CPU
    Intel Core 2 Duo T7300 2.00GHz
    Memory
    4GB
    Graphics card(s)
    NVIDIA GeForce 8600M GS
    Sound Card
    Realtek
    Screen Resolution
    1280 x 800 x 4294967296 colors
    Internet Speed
    crawl
It should be noted, You only need NoScript for 32bit Firefox...

64bit users using Firefox 64bit or Internet Explorer 64bit are not vulnerable to these flaws ;)
 

My Computer

I still don't see how it's that big of a "threat". It can only make you click on links within a webpage, and then the sb-webpages that it may possibly open. All you need to do is open the task-manager and end the clickjacked browsers process, or in the worst case scenario you could hard-reboot your computer.

It still can't make you download or install and execute any files.
 

My Computer

System One

  • Manufacturer/Model
    Acropolis
    CPU
    Intel Core i7-6800k @ 4.0 GHz
    Motherboard
    ASUS X99-M WS
    Memory
    32GB Corsair Vengeance 2x16GB
    Graphics card(s)
    ASUS GeForce GTX 1080 STRIX
    Monitor(s) Displays
    ASUS ROG Swift PG278Q
    Screen Resolution
    2560x1440
    Hard Drives
    2x 256GB Samsung 850 Pro (RAID 0) 1x 500GB Samsung 850 Evo 2x Western Digital RED 4TB (RAID 1) 50TB File Server (Multiple RAID 6)
    PSU
    Corsair AX1200i
    Case
    Corsair Air 240
    Mouse
    Logitech G502
    Keyboard
    Razer Blackwidow X Chroma
    Internet Speed
    250Mbps Down | 15 Mbps Up
An update

Adobe posts workaround for clickjacking flaw, NoScript releases ClearClick

http://blogs.zdnet.com/security/images/noscript_clickjacking_protection.png

Adobe posts workaround for clickjacking flaw, NoScript releases ClearClick | Zero Day | ZDNet.com

Following the recent release of a PoC demonstrating clickjacking in action, Adobe has released a security advisory offering solutions for customers and IT administrators on dealing with the flaw until they releases a Flash player patch before the end of October.

“We have just posted a Security Advisory for Flash Player in response to recently published reports of a ‘Clickjacking’ issue in multiple web browsers that could allow an attacker to lure a web browser user into unknowingly clicking on a link or dialog. This potential ‘Clickjacking’ browser issue affects Adobe Flash Player’s microphone and camera access dialog. A Flash Player update to mitigate the issue will be available before the end of October. In the meantime, users can apply the workaround described in the Advisory.”


And since prevention is better than the cure — at least in the short term — the just released NoScript v1.8.2.1 aims to prove exactly the same with its ClearClick feature :

“The most specific and ambitious is called ClearClick: whenever you click or otherwise interact, through your mouse or your keyboard, with an embedded element which is partially obstructed, transparent or otherwise disguised, NoScript prevents the interaction from completing and reveals you the real thing in “clear”. At that point you can evaluate if the click target was actually the intended one, and decide if keeping it locked or unlock it for free interaction. This comes quite handy now that more dangerous usages of clickjacking are being disclosed, such as enabling your microphone or your webcam behind your back to spy you through the interwebs.”

Click in the clear, and make sure you’re not susceptible to exploitation through last quarter’s security vulnerabilities.
 

My Computer

System One

  • Manufacturer/Model
    Acer Aspire 5920gmi notebook
    CPU
    Intel Core 2 Duo T7300 2.00GHz
    Memory
    4GB
    Graphics card(s)
    NVIDIA GeForce 8600M GS
    Sound Card
    Realtek
    Screen Resolution
    1280 x 800 x 4294967296 colors
    Internet Speed
    crawl
Back
Top