Article Details
Scrape Timestamp (UTC): 2025-01-01 13:29:20.012
Source: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
Original Article Text
Click to Toggle View
New "DoubleClickjacking" Exploit Bypasses Clickjacking Protections on Major Websites. Threat hunters have disclosed a new "widespread timing-based vulnerability class" that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites. The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo. "Instead of relying on a single click, it takes advantage of a double-click sequence," Yibelo said. "While it might sound like a small change, it opens the door to new UI manipulation attacks that bypass all known clickjacking protections, including the X-Frame-Options header or a SameSite: Lax/Strict cookie." Clickjacking, also called UI redressing, refers to an attack technique in which users are tricked into clicking on a seemingly innocuous web page element (e.g., a button), leading to the deployment of malware or exfiltration of sensitive data. DoubleClickjacking is a variation of this theme that exploits the gap between the start of a click and the end of the second click to bypass security controls and takeover accounts with minimal interaction. Specifically, it involves the following steps - "Most web apps and frameworks assume that only a single forced click is a risk," Yibelo said. "DoubleClickjacking adds a layer many defenses were never designed to handle. Methods like X-Frame-Options, SameSite cookies, or CSP cannot defend against this attack." Website owners can eliminate the vulnerability class using a client-side approach that disables critical buttons by default unless a mouse gesture or key press is detected. Services like Dropbox already employ such preventative measures, it has been found. As long-term solutions, it's recommended that browser vendors adopt new standards akin to X-Frame-Options to defend against double-click exploitation. "DoubleClickjacking is a twist on a well-known attack class," Yibelo said. "By exploiting the event timing between clicks, attackers can seamlessly swap out benign UI elements for sensitive ones in the blink of an eye." The disclosure arrives nearly a year after the researcher also demonstrated another clickjacking variant called cross window forgery (aka gesture-jacking) that relies on persuading a victim to press or hold down the Enter key or Space bar on an attacker-controlled website to initiate a malicious action. On websites like Coinbase and Yahoo!, it could be abused to achieve an account takeover "if a victim that is logged into either site goes to an attacker website and holds the Enter/Space key." "This is possible because both sites allow a potential attacker to create an OAuth application with wide scope to access their API, and they both set a static and / or predictable 'ID' value to the 'Allow/Authorize' button that is used to authorize the application into the victim's account."
Daily Brief Summary
A newly discovered "DoubleClickjacking" technique allows attackers to bypass existing clickjacking protections and facilitate account takeovers on major websites.
The exploit uses a timing-based vulnerability that leverages a double-click sequence, unlike traditional single-click vulnerabilities.
This attack method exposes a gap in traditional web application security measures, as current defenses such as X-Frame-Options and SameSite cookies are ineffective against it.
DoubleClickjacking can manipulate user interfaces by replacing benign elements with malicious ones between the two clicks, deceiving users into executing unintended actions.
Some websites, like Dropbox, have implemented preventive measures by disabling critical interface buttons until a specific user interaction is detected.
Security researchers recommend that browser manufacturers develop new defensive standards similar to X-Frame-Options to specifically address vulnerabilities associated with double-click actions.
The vulnerability was identified and exposed by security researcher Paulos Yibelo, who previously discovered related clickjacking variants such as cross window forgery.
As a long-term solution, continued innovation and adaptation of browser and web application defenses are necessary to protect against evolving threats like DoubleClickjacking.