html5

3 articles
sort: new top best
clear filter
0 6/10

Security researcher discovered and bypassed a clickjacking vulnerability on Binary.com's ticktrade subdomain by exploiting HTML5 sandboxed iframes with specific permissions (allow-modals, allow-scripts, allow-forms, allow-popups, allow-same-origin) to circumvent JavaScript frame-busting defenses.

Binary.com Binary Ltd. ticktrade.binary.com Ameer Assadi
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 7/10

A clickjacking vulnerability in Microsoft Yammer was discovered by exploiting HTML5 sandboxed iframes to bypass the application's frame-busting JavaScript protections, allowing attackers to iframe sensitive pages and perform unauthorized actions on behalf of logged-in users. Microsoft patched the issue by implementing X-Frame-Options: SAMEORIGIN header.

Microsoft Yammer Seekurity Mohamed A. Baset
seekurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 6/10

A clickjacking vulnerability in Telegram's web client allowed attackers to iframe the application using sandboxed iframes to bypass frame-busting JavaScript, combined with blocking the app.css stylesheet to circumvent CSS-based visibility controls, enabling CSRF attacks and unauthorized account actions. The vulnerability was fixed by implementing server-side X-Frame-Options headers.

Telegram Mohamed A. Baset Pavel Durov Seekurity
seekurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details