2.Vulnerability Description:
Typically there is one type of attack - cross site request forgeries (CSRF) that can interact with functions on other websites.
Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a or
1.Vulnerability name: Clickjacking
2.Vulnerability Description: Typically there is one type of attack - cross site request forgeries (CSRF) that can interact with functions on other websites. Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a or
3.Vulnerable URL: https://elevate-lab.github.io/elevate-lab-website/
4.Steps to reproduce the vulnerability:
a.Open notepad and paste the following code
Website is vulnerable to clickjacking!