Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1021:Improper Restriction of Rendered UI Layers or Frames
Weakness ID:1021
Version:v4.17
Weakness Name:Improper Restriction of Rendered UI Layers or Frames
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.

▼Extended Description

A web application is expected to place restrictions on whether it is allowed to be rendered within frames, iframes, objects, embed or applet elements. Without the restrictions, users can be tricked into interacting with the application when they were not intending to.

▼Alternate Terms
Clickjacking


UI Redress Attack


Tapjacking

"Tapjacking" is similar to clickjacking, except it is used for mobile applications in which the user "taps" the application instead of performing a mouse click.

▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowed-with-ReviewC441Unintended Proxy or Intermediary ('Confused Deputy')
ChildOfAllowed-with-ReviewC451User Interface (UI) Misrepresentation of Critical Information
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 441
Name: Unintended Proxy or Intermediary ('Confused Deputy')
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 451
Name: User Interface (UI) Misrepresentation of Critical Information
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC355User Interface Security Issues
MemberOfProhibitedC1348OWASP Top Ten 2021 Category A04:2021 - Insecure Design
MemberOfProhibitedC1396Comprehensive Categorization: Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 355
Name: User Interface Security Issues
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1348
Name: OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1396
Name: Comprehensive Categorization: Access Control
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-309Web Based (technology class) Weaknesses
MemberOfProhibitedBSBOSS-316Bypass Protection Mechanism (impact)
MemberOfProhibitedBSBOSS-318Modify Application Data (impact)
MemberOfProhibitedBSBOSS-328Read Application Data (impact)
MemberOfProhibitedBSBOSS-332Gain Privileges or Assume Identity (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-309
Name: Web Based (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-316
Name: Bypass Protection Mechanism (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-318
Name: Modify Application Data (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-328
Name: Read Application Data (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-332
Name: Gain Privileges or Assume Identity (impact)
▼Relevant To View
Relevant to the view"OWASP Top Ten (2021) - (1344)"
NatureMappingTypeIDName
MemberOfProhibitedC1348OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1348
Name: OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC355User Interface Security Issues
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 355
Name: User Interface Security Issues
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
Access ControlN/AGain Privileges or Assume IdentityBypass Protection MechanismRead Application DataModify Application Data

An attacker can trick a user into performing actions that are masked and hidden from the user's view. The impact varies widely, depending on the functionality of the underlying application. For example, in a social media application, clickjacking could be used to trik the user into changing privacy settings.

Scope: Access Control
Likelihood: N/A
Impact: Gain Privileges or Assume Identity, Bypass Protection Mechanism, Read Application Data, Modify Application Data
Note:

An attacker can trick a user into performing actions that are masked and hidden from the user's view. The impact varies widely, depending on the functionality of the underlying application. For example, in a social media application, clickjacking could be used to trik the user into changing privacy settings.

▼Potential Mitigations
Phase:Implementation
Mitigation ID:
Strategy:
Effectiveness:
Description:

The use of X-Frame-Options allows developers of web content to restrict the usage of their application within the form of overlays, frames, or iFrames. The developer can indicate from which domains can frame the content.

The concept of X-Frame-Options is well documented, but implementation of this protection mechanism is in development to cover gaps. There is a need for allowing frames from multiple domains.

Note:


Phase:Implementation
Mitigation ID:
Strategy:
Effectiveness:
Description:

A developer can use a "frame-breaker" script in each page that should not be framed. This is very helpful for legacy browsers that do not support X-Frame-Options security feature previously mentioned.

It is also important to note that this tactic has been circumvented or bypassed. Improper usage of frames can persist in the web application through nested frames. The "frame-breaking" script does not intuitively account for multiple nested frames that can be presented to the user.

Note:


Phase:Implementation
Mitigation ID:
Strategy:
Effectiveness:
Description:

This defense-in-depth technique can be used to prevent the improper usage of frames in web applications. It prioritizes the valid sources of data to be loaded into the application through the usage of declarative policies. Based on which implementation of Content Security Policy is in use, the developer should use the "frame-ancestors" directive or the "frame-src" directive to mitigate this weakness. Both directives allow for the placement of restrictions when it comes to allowing embedded content.

Note:

▼Modes Of Introduction
Phase: Implementation
Note:

N/A

▼Applicable Platforms
Technology
Class: Web Based(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-2017-7440
E-mail preview feature in a desktop application allows clickjacking attacks via a crafted e-mail message
CVE-2017-5697
Hardware/firmware product has insufficient clickjacking protection in its web user interface
CVE-2017-4015
Clickjacking in data-loss prevention product via HTTP response header.
CVE-2016-2496
Tapjacking in permission dialog for mobile OS allows access of private storage using a partially-overlapping window.
CVE-2015-1241
Tapjacking in web browser related to page navigation and touch/gesture events.
CVE-2017-0492
System UI in mobile OS allows a malicious application to create a UI overlay of the entire screen to gain privileges.
Reference: CVE-2017-7440
Description:
E-mail preview feature in a desktop application allows clickjacking attacks via a crafted e-mail message
Reference: CVE-2017-5697
Description:
Hardware/firmware product has insufficient clickjacking protection in its web user interface
Reference: CVE-2017-4015
Description:
Clickjacking in data-loss prevention product via HTTP response header.
Reference: CVE-2016-2496
Description:
Tapjacking in permission dialog for mobile OS allows access of private storage using a partially-overlapping window.
Reference: CVE-2015-1241
Description:
Tapjacking in web browser related to page navigation and touch/gesture events.
Reference: CVE-2017-0492
Description:
System UI in mobile OS allows a malicious application to create a UI overlay of the entire screen to gain privileges.
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      Automated Static Analysis
      Detection Method ID:DM-14
      Description:

      Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

      Effectiveness:High
      Note:

      N/A

      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      CAPEC-103
      Clickjacking
      CAPEC-181
      Flash File Overlay
      CAPEC-222
      iFrame Overlay
      CAPEC-504
      Task Impersonation
      CAPEC-506
      Tapjacking
      CAPEC-587
      Cross Frame Scripting (XFS)
      CAPEC-654
      Credential Prompt Impersonation
      ID: CAPEC-103
      Name: Clickjacking
      ID: CAPEC-181
      Name: Flash File Overlay
      ID: CAPEC-222
      Name: iFrame Overlay
      ID: CAPEC-504
      Name: Task Impersonation
      ID: CAPEC-506
      Name: Tapjacking
      ID: CAPEC-587
      Name: Cross Frame Scripting (XFS)
      ID: CAPEC-654
      Name: Credential Prompt Impersonation
      ▼References
      Reference ID: REF-35
      Title: Clickjacking For Shells
      Author: Andrew Horton
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://www.exploit-db.com/docs/17881.pdf
      URL Date:
      Day:N/A
      Month:N/A
      Year:N/A
      Reference ID: REF-36
      Title: Clickjacking - OWASP
      Author: OWASP
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://owasp.org/www-community/attacks/Clickjacking
      URL Date:2023-04-07
      Day:N/A
      Month:N/A
      Year:N/A
      Reference ID: REF-37
      Title: SecTheory
      Author: Internet Security
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://www.sectheory.com/clickjacking.htm
      URL Date:2023-04-07
      Day:N/A
      Month:N/A
      Year:N/A
      Reference ID: REF-38
      Title: Content Security Policy Level 3
      Author: W3C
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://w3c.github.io/webappsec-csp/
      URL Date:
      Day:N/A
      Month:N/A
      Year:N/A
      Details not found