{ "id": "bundle--41285adb-a292-45e0-bfdb-7e929a3024ef", "objects": [ { "created": "2017-02-01T00:00:00.000Z", "created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd", "description": "This attack pattern combines malicious Javascript and a legitimate webpage loaded into a concealed iframe. The malicious Javascript is then able to interact with a legitimate webpage in a manner that is unknown to the user. This attack usually leverages some element of social engineering in that an attacker must convinces a user to visit a web page that the attacker controls.", "external_references": [ { "external_id": "CAPEC-587", "source_name": "capec", "url": "https://capec.mitre.org/data/definitions/587.html" }, { "external_id": "CWE-1021", "source_name": "cwe", "url": "http://cwe.mitre.org/data/definitions/1021.html" }, { "description": "Cross Frame Scripting", "source_name": "OWASP Attacks", "url": "https://owasp.org/www-community/attacks/Cross_Frame_Scripting" }, { "description": "Cross Frame Scripting, 2016, OWASP", "external_id": "REF-469", "source_name": "reference_from_CAPEC", "url": "https://www.owasp.org/index.php/Cross_Frame_Scripting" }, { "description": "Gustave Rydstedt, Elie Bursztein, Dan Boneh, and Collin Jackson, Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites, 2010--07---20", "external_id": "REF-470", "source_name": "reference_from_CAPEC", "url": "https://seclab.stanford.edu/websec/framebusting/framebust.pdf" } ], "id": "attack-pattern--0184fd4d-9134-42c0-b073-5e614773d408", "modified": "2023-01-24T00:00:00.000Z", "name": "Cross Frame Scripting (XFS)", "object_marking_refs": [ "marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d" ], "spec_version": "2.1", "type": "attack-pattern", "x_capec_abstraction": "Detailed", "x_capec_child_of_refs": [ "attack-pattern--ec41b2b3-a3b6-4af0-be65-69e82907dfef" ], "x_capec_consequences": { "Confidentiality": [ "Read Data (Cross Frame Scripting allows an adversary to steal sensitive data from a legitimate site.)" ] }, "x_capec_domains": [ "Social Engineering", "Software" ], "x_capec_example_instances": [ "An adversary-controlled webpage contains malicious Javascript and a concealed iframe containing a legitimate website login (i.e., the concealed iframe would make it appear as though the actual legitimate website was loaded). When the user interacts with the legitimate website in the iframe, the malicious Javascript collects that sensitive information." ], "x_capec_prerequisites": [ "The user's browser must have vulnerabilities in its implementation of the same-origin policy. It allows certain data in a loaded page to originate from different servers/domains." ], "x_capec_status": "Draft", "x_capec_typical_severity": "High", "x_capec_version": "3.9" } ], "type": "bundle" }