Dark Mode
Capec-587 Detail
Cross Frame Scripting (XFS)
Detailed Social Engineering Software Typical Severity: High
Parents: 103
Threats: T271 T292
This attack pattern combines malicious Javascript and a legitimate webpage loaded into a concealed iframe. The malicious Javascript is then able to interact with a legitimate webpage in a manner that is unknown to the user. This attack usually leverages some element of social engineering in that an attacker must convinces a user to visit a web page that the attacker controls.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-587 | capec | https://capec.mitre.org/data/definitions/587.html | |
| CWE-1021 | cwe | http://cwe.mitre.org/data/definitions/1021.html | |
| OWASP Attacks | https://owasp.org/www-community/attacks/Cross_Frame_Scripting | Cross Frame Scripting | |
| REF-469 | reference_from_CAPEC | https://www.owasp.org/index.php/Cross_Frame_Scripting | Cross Frame Scripting, 2016, OWASP |
| REF-470 | reference_from_CAPEC | https://seclab.stanford.edu/websec/framebusting/framebust.pdf | Gustave Rydstedt, Elie Bursztein, Dan Boneh, and Collin Jackson, Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites, 2010--07---20 |
Not present
- The user's browser must have vulnerabilities in its implementation of the same-origin policy. It allows certain data in a loaded page to originate from different servers/domains.
Not present
Not present
| Confidentiality |
|---|
| Read Data (Cross Frame Scripting allows an adversary to steal sensitive data from a legitimate site.) |
- An adversary-controlled webpage contains malicious Javascript and a concealed iframe containing a legitimate website login (i.e., the concealed iframe would make it appear as though the actual legitimate website was loaded). When the user interacts with the legitimate website in the iframe, the malicious Javascript collects that sensitive information.