CAPEC-587 Cross Frame Scripting (XFS)

CAPEC ID: 587

CAPEC-587 Metadata

Likelihood of Attack

Medium

Typical Severity

High

Overview

Summary

This attack pattern combines malicious Javascript and a legitimate webpage loaded into a concealed iframe. The malicious Javascript is then able to interact with a legitimate webpage in a manner that is unknown to the user. This attack usually leverages some element of social engineering in that an attacker must convinces a user to visit a web page that the attacker controls.

Prerequisites

The user's browser must have vulnerabilities in its implementation of the same-origin policy. It allows certain data in a loaded page to originate from different servers/domains.

Potential Solutions / Mitigations

Avoid clicking on untrusted links. Employ techniques such as frame busting, which is a method by which developers aim to prevent their site being loaded within a frame.

Related Weaknesses (CWE)

CWE ID Description
CWE-1021 Improper Restriction of Rendered UI Layers or Frames

Related CAPECs

CAPEC ID Description
CAPEC-103 An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system.

Taxonomy Mappings

Taxonomy: OWASP Attacks

Entry ID Entry Name
Link Cross Frame Scripting

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.