ClearClick Bypass?

Ask for help about NoScript, no registration needed to post
Howdy

ClearClick Bypass?

Post by Howdy »

http://lcamtuf.coredump.cx/clickit/ doesn't seem to trigger ClearClick.
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:8.0) Gecko/20100101 Firefox/8.0
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: ClearClick Bypass?

Post by Tom T. »

There is a warning at the top of the browser, "This website has asked to redirect to (the fake bank site)". That was good enough for me not to allow it. (except as an experiment, of course.)

And the attack does nothing at all if you don't allow script at the attacker's site.

If you'd like to see something interesting, go to the linked site, do *not* allow any script, and click the link "can be made seamless". The guts get exposed. :)

I can't immediately find the thread in which Giorgio explained to another user that the yellow bar at the top means it isn't a true clickjack attack, but just more NoScript protection against JS redirects.

Side note: For best safety, in Firefox Tools > Options > Content > Enable JavaScript > Advanced, uncheck *all* boxes on the pop-up box. "Allow scripts to..."
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.24) Gecko/20111103 Firefox/3.6.24
User avatar
therube
Ambassador
Posts: 7969
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: ClearClick Bypass?

Post by therube »

> There is a warning at the top of the browser, "This website has asked to redirect to (the fake bank site)".
> the yellow bar at the top means it isn't a true clickjack attack, but just more NoScript protection against JS redirects.

I saw neither the warning nor the yellow bar?

> And the attack does nothing at all if you don't allow script at the attacker's site.

Not necessarily.
If the attackers site is not allowed, JavaScript is not allowed to run on that site. But JavaScript need not necessarily be required. (You would think in most cases it is, but still.)

Not sure if "clickit" falls under the definition of "Clickjacking/ClearClick".

In any case, IMO, the POC is valid, it works.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:10.0a2) Gecko/20111211 Firefox/10.0a2 SeaMonkey/2.7a2
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: ClearClick Bypass?

Post by Tom T. »

therube wrote:
Tom T. wrote: There is a warning at the top of the browser, "This website has asked to redirect to (the fake bank site)".
> the yellow bar at the top means it isn't a true clickjack attack, but just more NoScript protection against JS redirects.
I saw neither the warning nor the yellow bar?
It took several iterations of "playing the game"

> And the attack does nothing at all if you don't allow script at the attacker's site.
Not necessarily.
If the attackers site is not allowed, JavaScript is not allowed to run on that site. But JavaScript need not necessarily be required. (You would think in most cases it is, but still.)
Perhaps on Fx 8.x or the equivalent SM, But on Fx 3.6.24, default-denying the site's JS means that clicking the POC button produced "no action at all".
Perhaps it is another "improvement" in newer Fx and SM.
Not sure if "clickit" falls under the definition of "Clickjacking/ClearClick".
Agreed, it was more of a JS redirect. True clickjacking would nvolve layered elements, which I did not see in a brief glance.
In any case, IMO, the POC is valid, it works.
It didn't for me, until the POC site's JS was TA'd. And i got the "warning" after playing the "game" several times.
And at the other link cited, it produced a blank page, listing all the scripts that were blocked (in the page, not just the NS menu)

Perhaps a difference from older Fx/SM, but a regression, IMHO. YMMV.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/3.6.24
User avatar
therube
Ambassador
Posts: 7969
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: ClearClick Bypass?

Post by therube »

Not necessarily.
If the attackers site is not allowed, JavaScript is not allowed to run on that site. But JavaScript need not necessarily be required. (You would think in most cases it is, but still.)
Perhaps on Fx 8.x or the equivalent SM, But on Fx 3.6.24, default-denying the site's JS means that clicking the POC button produced "no action at all".
Perhaps it is another "improvement" in newer Fx and SM.
In this instance, I was speaking in general, & not specifically about the particular POC.

Just pointing out that JavaScript is not a prerequisite for "malware".

v 2.2.4rc2
==========================================================================
+ [ClearClick] Enhanced protection against same-window timing attacks
with moving pointer (thanks Michal Zalewski for PoC)
Could you explain what we're supposed to see, or not, cause I'm not sure I'm seeing any change?

So I suppose I lost :(.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows NT 5.1; rv:10.0a2) Gecko/20111212 Firefox/10.0a2 SeaMonkey/2.7a2
Post Reply