Improper Restriction of Rendered UI Layers or Frames in yourls/yourls
Reported on
Aug 23rd 2021
✍️ Description
It can be possible to perform a clickjacking attack due to the lack of frame restrictions. The application does not set the response header X-Frame-Options: DENY.
🕵️♂️ Proof of Concept
💥 Impact
According to PortSwigger references, it is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker. By inducing victim users to perform actions such as mouse clicks and keystrokes, the attacker can cause them to unwittingly carry out actions within the application that is being targeted. This technique allows the attacker to circumvent defenses against cross-site request forgery and may result in unauthorized actions.
Occurrences
References
Yeah, indeed. I'd qualify this as low severity but it's also a trivial fix. I'll fix this asap. Thanks for the heads up.
Issue fixed in https://github.com/YOURLS/YOURLS/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe
I clicked on "mark valid" and "confirm fix", I hope this was expected by people using this site.
This said, I'm not sure rewarding disclosure four times the amount of fixing is very virtuous and in the true spirit of open source. Just my 2 cents :)