Valid

Reported on

May 20th 2022


Description

The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.

Proof of Concept

Go to this URL: https://clickjacker.io/test?url=https:%2F%2Fdemo.easyappointments.org%2Findex.php%2Fuser%2Flogin

Observe that the website is getting embeded in an Iframe.

Observe that the headers x-frame-options and content-security-policy frame ancestors are missing.

COUNTERMEASURES:

X-FRAME-OPTIONS is a security header to prevent clickjacking

Impact

Users are tricked into performing all sorts of unintended actions are such as typing in the password, clicking on ‘Delete my account’ button, liking a post, deleting a post, commenting on a blog. In other words all the actions that a normal user can do on a legitimate website can be done using clickjacking.

We are processing your report and will contact the alextselegidis/easyappointments team within 24 hours. 10 months ago
We have contacted a member of the alextselegidis/easyappointments team and are waiting to hear back 10 months ago
We have sent a follow up to the alextselegidis/easyappointments team. We will try again in 7 days. 10 months ago
tharunavula
10 months ago

Researcher


hi team,

is there any update on this?

Regards, Tharun

We have sent a second follow up to the alextselegidis/easyappointments team. We will try again in 10 days. 10 months ago
We have sent a third and final follow up to the alextselegidis/easyappointments team. This report is now considered stale. 9 months ago
Alex Tselegidis validated this vulnerability 14 days ago

Hello! Thanks for posting this. Although this is something the server maintainer can define on their servers, I still think that it is a good idea having it as part of the code. So I've added this in the develop branch and will ship it with the next stable release (1.5.0)

tharunavula has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Alex Tselegidis marked this as fixed in 1.5.0 with commit f3a3fb 14 days ago
Alex Tselegidis has been awarded the fix bounty
This vulnerability will not receive a CVE
Alex Tselegidis published this vulnerability 14 days ago
to join this conversation