Summary

The COmanage Project and TAP containers have been updated to deter clickjacking attacks.

Update 2024 02 26

Registry v4.3.3 now includes this header in all requests.

Severity

The severity of this issue is very high, as clickjacking attacks are designed to be launched remotely.

Exposure

The exposure will generally be low, as it is generally considered difficult to exploit. There are no known instances in the wild of this attack.

Recommended Mitigation

Deployments should update to the latest containers available. This applies to both Registry and Match.

Beginning with Registry v4.3.3, the “Content-Security-Policy” HTTP header “frame-ancestors ‘self’” was added to all page layouts so that requests for iframe content cannot be made from a domain different from where Registry is deployed. This makes it difficult to build a click-jacking exploitable interface that fools end-users into believing they are interacting with their official Registry site.

header("Content-Security-Policy: frame-ancestors 'self'");

Similar changes will be added to Match in a future release.

Alternate Mitigations

Deployments may alternately update their Apache or other web server configurations to ensure frames can only come from the same origin. For example:

Header set Content-Security-Policy "frame-ancestors 'self';" 

Deployments supporting older browsers may wish to support older directives:

X-Frame-Options: SAMEORIGIN
Content-Security-Policy: frame-ancestors 'self' 

Discussion

"Clickjacking" is at attack whereby an attacker attempts to use multiple layers to trick a user into clicking a link they did not intend, often using an invisible iframe. More details about this sort of attack can be found here.

References

  • CO-2705


  • No labels