Hi team,

While performing security testing  of your website i have found the vulnerability called Clickjacking.

Many URLS are in scope and vulnerable to Clickjacking.

What is Clickjacking ?

Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.

The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a <frame> or <iframe>. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.

This vulnerability affects Web Server.

Steps to Reproduce / POC

Vulnerable Urls:https://www.sparta.eu

Put every above url one by one in the code of iframe, which  is given below

<!DOCTYPE HTML>

<html lang="en-US">

<head>

<meta charset="UTF-8">

<title>I Frame</title>

</head>

<body>

<h3>clickjacking vulnerability</h3>

<iframe src="https://www.sparta.eu"height="550px" width="700px"></iframe>

</body>

</html>

By Ridoy Mia

mdridoymia660@gmail.com

Notice that site is visible in the Iframe

POC is in the attachments. Thanks, waiting for your response.

Impact

Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attackers