![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRrG7TUCZcinUykRaMnd0ZpD72KvKPB1bMYB_Bj8n1yKosvBErCvoCDWxtVQxx_nhHZRPEd9x82yHag02-gjkuCPzklIR8pJgwG6M-Atql7pAxTpTBAkFAo_Jqweg-XNkP1M7P5Y7O574/s320/1.jpeg)
The worrying news is that none of the popular browsers, including the newly launched Google Chrome, besides Internet Explorer, Firefox, Safari and Opera are free from this exploit, according to reports.
The vulnerability can also be exploited through Flash plug-ins used by almost all the browsers to run video and video-based applications, and many shortcut buttons in the toolbars. The only browser which is reported to be immune to this attack is the lesser-known Lynx which incidentally is a text-only browser.
Are you sure you're safe?
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiuTLCIufkpEAwklMbWahJ4hUUK20vCWWeCvqeejdyny50CT4ovy1Kd-gvijG-5wont5EmV3b-6kfM9MuCv06MhMdHRD5b55z_pou6MXQk3sNlZ1NjvI2sHWJjIXBaj8qOuwJKvDsgSxg/s320/2.jpeg)
So while you might think you are clicking on your bank funds transfer link, or saving a favourite URL link at Digg, or some innocuous Facebook application, the reality could be entirely different, and dark.
An attack can invisibly hover these virtual buttons below the users' mouse, so that when they click on something they visually see, they actually are clicking on something else the attacker wants them to, warned security experts who reported the vulnerability.
Flaw is serious, warns US
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjphsdkR831DnDsq1Tk4lfjxIt7H99ZI9uwvs2A3Mz60UWniN71uQ1-FO5qoeUyPNKuvM9jk9KRQogWaXMqk7sGmO6qYJJwbvbxrE6vBe88ey8s6j6YOB-vzoztf5enCaviBMOZoL6XQj8/s320/3.jpeg)
Following this, the United States CERT deemed it serious enough to release a warning. "Clickjacking gives an attacker the ability to trick a user into clicking on something only barely or momentarily noticeable. Therefore, if users click on a Web page, they may actually be clicking on content from another page," warned the US CERT.
Turning off JavaScript won't help
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeVuAMS8EZAqDMBWmf6tmjow-ht-mDeC_N99nIYR_u2VlPqpkmeJhKUAA29fe5VghrxdVf8U0VqCHuA3yW4DkNxHpvpyqM5sB9QQ5buh0yow4kpKgJV-H-t794_EfG91yfIE2tEj_MJNk/s320/4.jpeg)
The two researchers claimed that even turning JavaScript off will not prevent the attack. In fact, it will take advantage of the "fundamental flaw" inherent in all browsers, said the two researchers.
Using a frame buster script will protect a user who uses cross-domain scripting. However, even that will not prevent the attack if it's on a site the user is visiting.
There is no defence
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjT1pK4kVVDjt3ckKXlDHhkuQ6IUvUje3PWFK0KciqtIw9ZHVC9ohB86rrrLTe7z4y9uIhLZEVnjc_8vHnRaL1-IdVmvuxhywuSH5rWF9zOb3yW9FrVDmXqdNGMtdUVozEmMGSBsSS0ZBs/s320/5.jpeg)
Since there is no viable foolproof defence against clickjacking at this time, the users have been advised to use browsers with the NoScript add-on installed, wherever possible. While this is not the solution, they said it will work in almost all such cases until a more permanent patch is found to plug the vulnerability.
Better safe than sorry
Hansen and Grossman said they have alerted industry majors such as Microsoft (IE8), Mozilla Foundation, Google, Apple Corp and Adobe so they could immediately start working on finding a solution to fix the problem. Software maker Adobe has already admitted in a company blog that one of its products is affected and it is working on a fix.
But this does not mean that the users will be safe until a solution is found and patched by the vendors, either separately or in the future versions of their software. Hence, precautions already proscribed by the security experts may well be the best anti-dote against the clickjacking vulnerability.
0 comments:
Post a Comment