ui-redressing

5 articles
sort: new top best
clear filter
0 5/10

Clickjacking vulnerability on Google Custom Search Engine (CSE) settings page allows attackers to trick users into deleting their CSE instances through UI redressing by overlaying fake buttons on an embedded iframe. Google rejected the finding as not severe enough despite the ability to delete user data.

Google CSE cse.google.com Akbar Kustirama
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 7/10

A clickjacking vulnerability in Instagram's account management endpoint allowed attackers to iframe AJAX responses containing connected application tokens and steal user credentials. The vulnerability existed because the `__a=1` parameter exposed sensitive token data in JSON format without X-Frame-Options protection, despite the regular UI having protections in place.

Instagram Facebook Mohamed A. Baset Mostafa Kassem Seekurity
seekurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 6/10

A clickjacking vulnerability in Facebook's AJAX endpoint (/ajax/home/generic.php) lacked X-Frame-Options headers, allowing attackers to iframe and redress the UI to trick victims into adding attackers to secret groups or performing other unintended actions via form submission.

Facebook Mohamed A. Baset Seekurity
seekurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 8/10

Steam Inventory Helper Chrome extension v1.13.6 suffered from a DOM-based XSS in bookmarks.html combined with clickjacking via over-permissive web_accessible_resources, allowing arbitrary JavaScript execution in the extension's privileged context and hijacking of all authenticated websites. The vulnerability exploits jQuery's unsafe DOM manipulation APIs (html/append) paired with unsafe-eval CSP directive, weaponized through UI redressing to trick users into pasting XSS payloads.

Steam Inventory Helper Matthew Bryant Chrome
thehackerblog.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 6/10

A writeup demonstrating how chaining self-XSS with clickjacking (UI redressing) via missing X-Frame-Options header can achieve session hijacking by stealing victim cookies through a drag-and-drop PoC that executes malicious JavaScript on the victim's browser.

Armaan Pathan InfoSec Write-ups HackerOne Bugcrowd Rahul Maini
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details