←back to thread

237 points shinzub | 1 comments | | HN request time: 0.213s | source
Show context
maxrmk ◴[] No.42742521[source]
This is clever, and I got a good laugh out of their example video. The demo UI of "Double click here" isn't very convincing - I bet there's a version of this that gets people to double click consistently though.
replies(4): >>42743385 #>>42743421 #>>42744773 #>>42746149 #
chatmasta ◴[] No.42743421[source]
The exploit would be more effective if it obfuscated the UI on the authorization (victim) page. Right now, even if you double click a convincing button, it’s extremely obvious that you just got duped (no pun intended).

Sure, maybe the attacker can abuse the access privileges before you have a chance to revoke them. But it’s not exactly a smooth clickjacking.

I’d start by changing the dimensions of the parent window (prior to redirecting to victim) to the size of the button on the target page - no need to show everything around it (assuming you can make it scroll to the right place). And if the OAuth redirects to the attacker page, it can restore the size to the original.

Back in the day, this trick was used for clickjacking Digg upvotes.

replies(2): >>42743818 #>>42755638 #
joshfraser ◴[] No.42743818[source]
You can change the visibility of the target page so they wouldn't know
replies(2): >>42744588 #>>42748706 #
1. jeroenhd ◴[] No.42748706[source]
I don't think you can, but you could open a popup over the target to hide the authorisation page to make it a little less obvious. JS also has a window.close() function for opened windows, but I believe browsers might show a warning when you try that on an external origin.

One could also confuse the user by spawning a whole bunch of tabs for other services after clicking the authorise button, making the user think something weird is going on and closing all the tabs that just popped up without realising they clicked the authorisation button.