Risk
10/8/2008
04:47 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Clickjacking Attack Lets Web Sites See, Hear You

The technique can be used to hijack a computer's Webcam and microphone to create a malicious surveillance platform.

Details about the cross-platform browser exploitation technique known as "clickjacking" have started to emerge. Among the more alarming ways it can be used: covertly watching and listening to people who have microphones and Webcams attached to their computers.

"Web pages know what Web sites you've been to ..., where you're logged in, what you watch on YouTube, and now they can literally 'see' and 'hear' you," warned Jeremiah Grossman, founder and CTO of WhiteHat Security, in a blog post.

On Tuesday, Flash developer Guy Aharonovsky published a proof-of-concept exploit to show how clickjacking can be used to spy on people. "I've written a quick and dirty Javascript game [to] exploit just that, and demonstrate how an attacker can get a hold of the user's camera and microphone," he said in a blog post. "This can be used, for example, with platforms [like Ustream.tv or Justin.tv] or to stream to a private server to create a malicious surveillance platform."

Grossman and Robert "RSnake" Hansen, founder and CEO of SecTheory, discovered the clickjacking technique, called "UI redressing" by some, and planned to discuss it at the 2008 Open Web Application Security Project USA NYC security conference last month. But the pair decided to delay disclosure to allow affected vendors time to address the issue.

Unfortunately, this hasn't proven to be easy because clickjacking encompasses a range of attack techniques and affects a variety of software applications, including the major Web browsers and a number of plug-ins like Adobe Flash.

Clickjacking, as Grossman previously described the attack, "gives an attacker the ability to trick a user into clicking on something only barely or momentarily noticeable. Therefore, if a user clicks on a Web page, they may actually be clicking on content from another page."

Adobe on Tuesday issued a security advisory that describes a way to mitigate the risk faced by those with Adobe Flash Player installed -- almost everyone online. The advisory applies to Adobe Flash Player 9.0.124.0 and earlier.

Adobe recommends setting the "Always deny" button in the Global Privacy Settings panel of the Adobe Flash Player settings. The company is also working on an update to its Flash Player software that will address the vulnerability.

While this step protects against clickjacking attacks that use Adobe Flash, many other software applications remain vulnerable. In a blog post, Hansen outlines the status of eight different issues, only some of which have been resolved. He stresses that there are multiple variants of clickjacking, some of which require cross-domain access, some of which use iframes, some of which require JavaScript, and some of which involve page overlays.

How to defend against clickjacking? "Put tape over your camera, disable your microphone, install NoScript, and/or disable your plug-ins," advises Grossman, even as he concedes few users will be willing to lose access to YouTube and Flash games as a result.

Nevertheless, U.S. CERT said much the same thing in an advisory late last month.

The latest version of NoScript, a Firefox browser plug-in that blocks Flash, Java, and JavaScript, includes a new anti-clickjacking feature called ClearClick. It reveals transparent or concealed windows so the user can see attempts to co-opt clicks for malicious purposes.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio