Home > CAPEC List > CAPEC-587: Cross Frame Scripting (XFS) (Version 2.10)  

CAPEC-587: Cross Frame Scripting (XFS)

 
Cross Frame Scripting (XFS)
Definition in a New Window Definition in a New Window
Attack Pattern ID: 587
Abstraction: Standard
Status: Draft
Completeness: Complete
Presentation Filter:
+ Summary

This attack pattern combines malicious Javascript and a legitimate webpage loaded into a concealed iframe. The malicious Javascript is then able to interact with a legitimate webpage in a manner that is unknown to the user. This attack usually leverages some element of social engineering in that an attacker must convinces a user to visit a web page that the attacker controls.

+ Attack Prerequisites
  • The user's browser must have vulnerabilities in its implementation of the same-origin policy. It allows certain data in a loaded page to originate from different servers/domains.

+ Typical Severity

High

+ Methods of Attack
  • Injection
+ Examples-Instances

Description

An adversary-controlled webpage contains malicious Javascript and a concealed iframe containing containing a legitimate website login (i.e., the concealed iframe would make it appear as though the actual legitimate website was loaded). When the user interacts with the legitimate website in the iframe, the malicious Javascript collects that sensitive information.

+ Solutions and Mitigations

Avoid clicking on untrusted links.

Employ techniques such as frame busting, which is a method by which developers aim to prevent their site being loaded within a frame.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Confidentiality
Read application data
Cross Frame Scripting allows an adversary to steal sensitive data from a legitimate site.
+ Purposes
  • Exploitation
+ CIA Impact
Confidentiality Impact: HighIntegrity Impact: High
+ References
[R.14.2] [REF-3] "Cross Frame Scripting". OWASP. 2016. <https://www.owasp.org/index.php/Cross_Frame_Scripting>.
[R.14.2] [REF-3] Gustave Rydstedt, Elie Bursztein, Dan Boneh, and Collin Jackson. "Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites". July 20, 2010. <https://seclab.stanford.edu/websec/framebusting/framebust.pdf>.
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2017-02-01Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: May 01, 2017