▲ | chatmasta 8 hours ago | ||||||||||||||||
The exploit would be more effective if it obfuscated the UI on the authorization (victim) page. Right now, even if you double click a convincing button, it’s extremely obvious that you just got duped (no pun intended). Sure, maybe the attacker can abuse the access privileges before you have a chance to revoke them. But it’s not exactly a smooth clickjacking. I’d start by changing the dimensions of the parent window (prior to redirecting to victim) to the size of the button on the target page - no need to show everything around it (assuming you can make it scroll to the right place). And if the OAuth redirects to the attacker page, it can restore the size to the original. Back in the day, this trick was used for clickjacking Digg upvotes. | |||||||||||||||||
▲ | joshfraser 7 hours ago | parent [-] | ||||||||||||||||
You can change the visibility of the target page so they wouldn't know | |||||||||||||||||
|