SlideShare a Scribd company logo
Frame Busting Vulnerability
October 20 2016
AGENDA
 Introduction
 How to Attack?
 Procedure to test this vulnerability
 How to fix?
 JIRA issue
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
INTRODUCTION
 Frame Busting refers to code or annotation provided by a web page
intended to prevent the web page from being loaded in a sub frame.
 It is widely used to steal the user session and other sensitive data.
 This can be identified with below conditions:
o If the application allow user to attack, to create the frame inside the
web application then it is vulnerable.
o If the attacker is able to render the web application in the frames,
then the attacker can steal the sensitive data.
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
HOW TO ATTACK
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA. www.loginsoft.com
Create a hacker
web page
Got spoofed
and gets
accessed to
the hacker
page
Send the Hacker
web page
Rendering the
web app in the
frames
PROCEDURE TO TEST
 Create a .HTML files and insert the below code in HTML file.
 <iframe src="test.html" height="1000" width="1200">
 Open your .HTML file in any browser.
 Validate that the given application is able to render in the frame.
 Open the developer console and track the network details, Response
header and session token in the network.
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
HOW TO FIX
 To fix this issue, add the below directives under the Header section:
o X-Frame-Options: DENY
o X-Frame-Options: SAMEORIGIN
o X-Frame-Options: ALLOW-FROM https://example.com/
 By using the above code, application doesn’t gets rendered in the
frame and instead, it will open in the new window.
 This can be fixed by validating the hostname and redirection code as
below:
If (top.location.hostname != self.location.hostname) throw 1;
} catch (e) {
top.location.href = self.location.href; }
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
CLIENT’S JIRA ISSUE
 Our Client’s Jira is vulnerable to this issue as shown in below:
o We have created the .HTML files and mentioned our Jira
application as a source in an iframes tags.
o After opening the application, the user is able to observe that Jira
application got rendered in the created iframe.
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
CLIENT’S JIRA ISSUE
After login to the Jira application, user should able to view sensitive
information on developer console.
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
CONCLUSION
As this vulnerability allows attacker to view sensitive
information, this is fixed in our client’s Jira application.
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
Thank you for your time!
4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com

More Related Content

Similar to Loginsoft

Web Application Penetration Tests - Vulnerability Identification and Details ...
Web Application Penetration Tests - Vulnerability Identification and Details ...Web Application Penetration Tests - Vulnerability Identification and Details ...
Web Application Penetration Tests - Vulnerability Identification and Details ...
Netsparker
 
A Practical Guide to Securing Modern Web Applications
A Practical Guide to Securing Modern Web ApplicationsA Practical Guide to Securing Modern Web Applications
A Practical Guide to Securing Modern Web Applications
Manish Shekhawat
 
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
Chapter5-Bypass-ClientSide-Control-Presentation.pptxChapter5-Bypass-ClientSide-Control-Presentation.pptx
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
ilhamilyas5
 
A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...
A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...
A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...
ufpb
 
Web Application Scanning 101
Web Application Scanning 101Web Application Scanning 101
Web Application Scanning 101
Sasha Nunke
 
How not to suck at Cyber Security
How not to suck at Cyber SecurityHow not to suck at Cyber Security
How not to suck at Cyber Security
Chris Watts
 
Security Tech Talk
Security Tech TalkSecurity Tech Talk
Security Tech Talk
Mallikarjun Reddy
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
fangjiafu
 
Chapter 5: Attack Execution - The Client
Chapter 5: Attack Execution - The ClientChapter 5: Attack Execution - The Client
Chapter 5: Attack Execution - The Client
Dr.Sami Khiami
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
Nahidul Kibria
 
Hacking3e ppt ch09
Hacking3e ppt ch09Hacking3e ppt ch09
Hacking3e ppt ch09
Skillspire LLC
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
Jeremiah Grossman
 
Obiee 11g security creating users groups and catalog permissions
Obiee 11g security  creating users groups and catalog permissionsObiee 11g security  creating users groups and catalog permissions
Obiee 11g security creating users groups and catalog permissions
Ravi Kumar Lanke
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
Mike Spaulding
 
Project Presentation
Project Presentation Project Presentation
Project Presentation
Inaam Ishaque Shaikh
 
Top security threats to Flash/Flex applications and how to avoid them
Top security threats to Flash/Flex applications and how to avoid themTop security threats to Flash/Flex applications and how to avoid them
Top security threats to Flash/Flex applications and how to avoid them
Elad Elrom
 
190 959
190 959190 959
190 959
trevioni
 
Carrell Jackson, the Web developer for Alexander Rocco Corporation, .pdf
Carrell Jackson, the Web developer for Alexander Rocco Corporation, .pdfCarrell Jackson, the Web developer for Alexander Rocco Corporation, .pdf
Carrell Jackson, the Web developer for Alexander Rocco Corporation, .pdf
shahidqamar17
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
Nilesh Sapariya
 
Java Application Development Vulnerabilities
Java Application Development VulnerabilitiesJava Application Development Vulnerabilities
Java Application Development Vulnerabilities
Narola Infotech
 

Similar to Loginsoft (20)

Web Application Penetration Tests - Vulnerability Identification and Details ...
Web Application Penetration Tests - Vulnerability Identification and Details ...Web Application Penetration Tests - Vulnerability Identification and Details ...
Web Application Penetration Tests - Vulnerability Identification and Details ...
 
A Practical Guide to Securing Modern Web Applications
A Practical Guide to Securing Modern Web ApplicationsA Practical Guide to Securing Modern Web Applications
A Practical Guide to Securing Modern Web Applications
 
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
Chapter5-Bypass-ClientSide-Control-Presentation.pptxChapter5-Bypass-ClientSide-Control-Presentation.pptx
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
 
A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...
A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...
A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...
 
Web Application Scanning 101
Web Application Scanning 101Web Application Scanning 101
Web Application Scanning 101
 
How not to suck at Cyber Security
How not to suck at Cyber SecurityHow not to suck at Cyber Security
How not to suck at Cyber Security
 
Security Tech Talk
Security Tech TalkSecurity Tech Talk
Security Tech Talk
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
Chapter 5: Attack Execution - The Client
Chapter 5: Attack Execution - The ClientChapter 5: Attack Execution - The Client
Chapter 5: Attack Execution - The Client
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 
Hacking3e ppt ch09
Hacking3e ppt ch09Hacking3e ppt ch09
Hacking3e ppt ch09
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Obiee 11g security creating users groups and catalog permissions
Obiee 11g security  creating users groups and catalog permissionsObiee 11g security  creating users groups and catalog permissions
Obiee 11g security creating users groups and catalog permissions
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
Project Presentation
Project Presentation Project Presentation
Project Presentation
 
Top security threats to Flash/Flex applications and how to avoid them
Top security threats to Flash/Flex applications and how to avoid themTop security threats to Flash/Flex applications and how to avoid them
Top security threats to Flash/Flex applications and how to avoid them
 
190 959
190 959190 959
190 959
 
Carrell Jackson, the Web developer for Alexander Rocco Corporation, .pdf
Carrell Jackson, the Web developer for Alexander Rocco Corporation, .pdfCarrell Jackson, the Web developer for Alexander Rocco Corporation, .pdf
Carrell Jackson, the Web developer for Alexander Rocco Corporation, .pdf
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Java Application Development Vulnerabilities
Java Application Development VulnerabilitiesJava Application Development Vulnerabilities
Java Application Development Vulnerabilities
 

Loginsoft

  • 2. AGENDA  Introduction  How to Attack?  Procedure to test this vulnerability  How to fix?  JIRA issue 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
  • 3. INTRODUCTION  Frame Busting refers to code or annotation provided by a web page intended to prevent the web page from being loaded in a sub frame.  It is widely used to steal the user session and other sensitive data.  This can be identified with below conditions: o If the application allow user to attack, to create the frame inside the web application then it is vulnerable. o If the attacker is able to render the web application in the frames, then the attacker can steal the sensitive data. 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
  • 4. HOW TO ATTACK 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA. www.loginsoft.com Create a hacker web page Got spoofed and gets accessed to the hacker page Send the Hacker web page Rendering the web app in the frames
  • 5. PROCEDURE TO TEST  Create a .HTML files and insert the below code in HTML file.  <iframe src="test.html" height="1000" width="1200">  Open your .HTML file in any browser.  Validate that the given application is able to render in the frame.  Open the developer console and track the network details, Response header and session token in the network. 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
  • 6. HOW TO FIX  To fix this issue, add the below directives under the Header section: o X-Frame-Options: DENY o X-Frame-Options: SAMEORIGIN o X-Frame-Options: ALLOW-FROM https://example.com/  By using the above code, application doesn’t gets rendered in the frame and instead, it will open in the new window.  This can be fixed by validating the hostname and redirection code as below: If (top.location.hostname != self.location.hostname) throw 1; } catch (e) { top.location.href = self.location.href; } 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
  • 7. CLIENT’S JIRA ISSUE  Our Client’s Jira is vulnerable to this issue as shown in below: o We have created the .HTML files and mentioned our Jira application as a source in an iframes tags. o After opening the application, the user is able to observe that Jira application got rendered in the created iframe. 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
  • 8. CLIENT’S JIRA ISSUE After login to the Jira application, user should able to view sensitive information on developer console. 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
  • 9. CONCLUSION As this vulnerability allows attacker to view sensitive information, this is fixed in our client’s Jira application. 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com
  • 10. Thank you for your time! 4437 Brookfield Corporate Dr, Suite 101, Chantilly, VA, www.loginsoft.com