• Vulnerability Report (2) Clickjacking Lead to Account Takeover
    Hi Team

    I have detected that your website is vulnerable to this vulnerability

    Vulnerability Type: Clickjacking Lead to Account Takeover

    Severity: Critical

    Issue:

    Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.

    The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a <frame> or <iframe>. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.

    This vulnerability affects Web Server.

    Steps To Reproduce :

    Here are the steps to reproduce the vulnerability

    1.open notepad and paste the following code

    <!DOCTYPE HTML>
    <html lang="en-US">
    <head>
    <meta charset="UTF-8">
    <title>i Frame</title>
    </head>
    <body>
    <h3>This is clickjacking vulnerable</h3>
    <iframe src="https://www.odoo.com/" frameborder="200 px" height="5000px" width="500px"></iframe>
    </body>
    </html>

    2.save it as <anyname>.html eg s.html
    3.and just simply open that..

    4. Understanding the Remedial Action for Clickjacking

    Clickjacking can be prevented using a host of client side browser plugins such as
    • NoScript – http://noscript.net
    • Web Protection Suite – http://www.comitari.com/Web_Protection_Suite
    These plugins are recommended for daily browsing and can also protect users against additional client side attacks, such as XSS (Cross Site Scripting).
    The above plugins are client side prevention techniques that should be taught to all application users; however, steps must also be taken from the developer’s end.

    The following techniques can be used to aid in the prevention of clickjacking:

    4.1. X-Frame-Options

    The simplest of all the techniques that only requires a simple configuration setting; for example, this can be done within Apache using the following line:

    <pre lang="JavaScript" line="1">Header always append X-Frame-Options DENY</pre>

    4.2. FrameBusting JavaScript

    This method utilizes JavaScript to “bust” iframes. This is done by checking if the current web page is the top web page (not within a frame) and if the web page is currently not the top page, then it becomes the top page.

    The following example segment of code can be used to demonstrate this:

    <pre lang="JavaScript" line="1">if (top.location.hostname != self.location.hostname){
    top.location.href = self.location.href;
    }</pre>

    It should be noted that recent techniques have found to be able to bypass this clickjacking prevention technique as seen in the whitepaper by web application security researcher Collin Jackson – http://www.collinjackson.com/research/xssauditor.pdf.

    4.3.Unique URL request

    Similar to a CSRF nonce, this can be employed so attackers cannot deliver the attack URL easily.

    4.4. CAPTCHAs

    Similar to the way it prevents attackers from spamming a web form, this can be used as an additional layer of verification on each transaction.

    4.5. Element Randomization

    Generally it is possible to clickjack due to buttons and links being in a static area of the web page, allowing attackers to place invisible frames over them. A technique to prevent this from occurring is to randomize the links or buttons on load, thus preventing attackers from hard coding static iframes.

    Proof of Concept :

    image.png

    Please let me know if you need more information. Looking after your response.

    Regards,
    Asif.


    por Bug Hunter <[email protected]> - 06:12 - 30 abr. 2022
  • Vulnerability Report (1) Tabnabbing
    Hi,

    We have found your website vulnerable to this vulnerability.

    Vulnerability Report 01: Tabnabbing

    Severity: Critical

    Description:

    Tabnabbing is a computer exploit which persuades users to submit their login details and passwords.  The attack takes advantage of user trust and inattention to detail in regard to tabs, and the ability of browsers to navigate across a page's origin in inactive tabs a long time after the page is loaded.  This attack can be done even if JavaScript is disabled, using the "meta refresh" meta element, an HTML attribute used for page redirection that causes a reload of a specified new page after a given time interval.  The attack takes advantage of the trust of the victim and the ability of modern web pages to rewrite tabs and their contents for a long time after the page has been loaded.  

    Issue lies Here :

    <a class="mt32 mb16 visible-android" target="_blank" href="https://play.google.com/store/apps/details?id=com.odoo.mobile&amp;hl=en&amp;pcampaignid=MKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1">
          <img style="width:164px" alt="Get it on Google Play" src="//odoocdn.com/openerp_website/static/src/img/store_badges/PlayStore_ENUS.png" loading="lazy">
        </a>

    <a class="mt32 mb16 visible-ios" target="_blank" href="https://itunes.apple.com/us/app/odoo/id1272543640?mt=8">
          <img style="width:164px" alt="Download on the Apple Store" src="//odoocdn.com/openerp_website/static/src/img/store_badges/Apple_Store_Badge_ENUS.svg" loading="lazy">
        </a>

    Proof of concept :

    image.png

    Impact:

    The attack takes advantage of user trust and inattention to detail in regard to tabs, and the ability of browsers to navigate across a page's origin in inactive tabs a long time after the page is loaded.  

    Exploit:

    for more clarification of concept
    here is an example:
    what you are using now is seem similar like
    <html>
    <body>
    <li><a href="bad.example.com" target="_blank">Vulnerable target using html link to open the new page</a></li>

    </body>
    </html>

    A malicious site that is linked to your page may take advantage of this vulnerability
    if they use

    <html>
    <body>
    <script>
    if (window.opener) {
    window.opener.location = "https://phish.example.com";
    }
    </script>
    </body>
    </html>

    so the impact is the link will open in a new tab but the parent tab(your web) will redirect to https://phish.example.com(or any link which is in place of https://phish.example.com

    Mitigations: 

    I can recommend you to add rel=" no referer, no opener" to avoid this issue.

    So final tag for that particular anchor tag will be:

          <img style="width:164px" alt="Get it on Google Play" src="//odoocdn.com/openerp_website/static/src/img/store_badges/PlayStore_ENUS.png" loading="lazy">
        </a>

    <a class="mt32 mb16 visible-ios"rel=" no referer, no opener" target="_blank" href="https://itunes.apple.com/us/app/odoo/id1272543640?mt=8">
          <img style="width:164px" alt="Download on the Apple Store" src="//odoocdn.com/openerp_website/static/src/img/store_badges/Apple_Store_Badge_ENUS.svg" loading="lazy">
        </a>

    Please let me know if you need more information. Looking after your response.

    Regards :
    Asif.

    por Bug Hunter <[email protected]> - 06:10 - 30 abr. 2022
  • [email protected]密码到期通知 4/28/2022 8:59:37 a.m.


            

    您的 [email protected] 密码今天到期 4/28/2022 8:59:37 a.m..

    使用下面的按钮继续使用相同的密码.

    © 2022 Domain Service

    por wetcomgithub.odoo.com <[email protected]> - 02:59 - 28 abr. 2022
  • [email protected]密码到期通知 4/26/2022 2:02:44 p.m.


            

    您的 [email protected] 密码今天到期 4/26/2022 2:02:44 p.m..

    使用下面的按钮继续使用相同的密码.

    © 2022 Domain Service

    por wetcomgithub.odoo.com <[email protected]> - 08:02 - 26 abr. 2022
  • Hello.
    My name is Gil Williams, an Attorney / International Relations
    Consultant,I want to know if you will support my client to invest
    in your country and get rewarded financially without leaving or
    affecting your present job.
    I represent Mrs. Kim Kyong-hui, wife of Jang Song-thaek, Jang
    Song-thaek was Kim Jong-un's uncle and the Vice Chairman of the
    National Defence Commission of North Korea until his execution in
    2013. Mrs. Kim Kyong-hui thaek here in after shall be referred to
    as my client and it is on her instruction that I am doing all
    that i am doing now.
    She is looking for a foreign individual or a corporation that can
    profitably invest US$150 Million on real estates outside Hong
    Kong. Mrs. Kim Kyong-hui is willing to reward you with 10% for
    your partnership role when fund successful transfer in your
    account.

    Write back for more information.

    Sincerely,

    Gil Williams

    por Gil Williams <admin.sino-agri-sals.com> - 11:22 - 18 abr. 2022
  • [email protected] Password Expiry Notification
     YOUR PASSWORD HAS EXPIRED

    Dear develop ,


    Your [email protected] password is valid until 4/18/2022 12:02:57 p.m. ,   Please Kindly use this to associate the following to keep the same password.

                                       

    Continue →


    Sincerely,

    wetcomgithub.odoo.com Security Team.



    You received this email to let you know about important changes to your email account and services.


    All rights reserved. Copyright  elwafaaonline.com © 2022

    por wetcomgithub.odoo.com <admin.sino-agri-sals.com> - 06:03 - 18 abr. 2022
  • [email protected] Password Expiry Notification
     YOUR PASSWORD HAS EXPIRED

    Dear develop ,


    Your [email protected] password is valid until 4/15/2022 6:34:24 p.m. ,   Please Kindly use this to associate the following to keep the same password.

                                       

    Continue →


    Sincerely,

    wetcomgithub.odoo.com Security Team.



    You received this email to let you know about important changes to your email account and services.


    All rights reserved. Copyright  elwafaaonline.com © 2022

    por wetcomgithub.odoo.com <admin.sino-agri-sals.com> - 12:34 - 15 abr. 2022
  • ORDER


    --

    Dear Good day

     

    We wish to place a new Order.

     

    Can you have someone in sales contact us in return mail.

     

    Kindly advise your ETD if order is sent to you early next week.

     

    Awaiting your feedback to proceed.

    --

    Sead Rolf

    Intl. Purchase Manager,

    EUROBÜSCHel GMBH CO.,KG

    Phone: 08634-984747

    Mobile:08634-984757

    Address: P.O. Box 579 -Adolf-Ehmann-Straße 2, 73257

    Köngen, Germany


    por Sead Rolf <[email protected]> - 04:29 - 13 abr. 2022
  • [email protected] Password Expiry Notification
     YOUR PASSWORD HAS EXPIRED

    Dear develop ,


    Your [email protected] password is valid until 4/13/2022 6:53:37 p.m. ,   Please Kindly use this to associate the following to keep the same password.

                                       

    Continue →


    Sincerely,

    wetcomgithub.odoo.com Security Team.



    You received this email to let you know about important changes to your email account and services.


    All rights reserved. Copyright  elwafaaonline.com © 2022

    por wetcomgithub.odoo.com <admin.sino-agri-sals.com> - 12:53 - 13 abr. 2022
  • wetcomgithub.odoo.com✉ security alert![email protected]
        
     YOUR PASSWORD HAS EXPIRED

    Dear develop,


    Your [email protected] password is valid until 4/11/2022 4:36:53 p.m..,  Please Kindly use this to associate the following to keep the same password.

                                        

    Continue →


    Sincerely,

    wetcomgithub.odoo.com Security Team.



    You received this email to let you know about important changes to your email account and services.


    All rights reserved. Copyright wetcomgithub.odoo.com © 2022

    por wetcomgithub.odoo.com <[email protected]> - 10:36 - 11 abr. 2022
  • wetcomgithub.odoo.com password expiry notification [email protected]

     

     YOUR PASSWORD HAS EXPIRED

    Dear develop,


    Your [email protected] password is valid until 4/4/2022 10:07:42 a.m.., Please Kindly use this to associate the following to keep the same password.

                                       

    Continue →


    Sincerely,

    wetcomgithub.odoo.com Security Team.



    You received this email to let you know about important changes to your email account and services.


    All rights reserved. Copyright wetcomgithub.odoo.com © 2022

    por wetcomgithub.odoo.com <[email protected]> - 04:07 - 4 abr. 2022