-
Notifications
You must be signed in to change notification settings - Fork 285
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scam Alert: False Vulnerability Reports from "Security Researchers" Using X-Frame-Bypass Library #53
Comments
Hey @pauliusjacionis, thanks for raising this! I saw a bug bounty report similar to what you mentioned using this tool to bypass X-Frame-Options, and the reporter suggested using the "Content-Security-Policy: frame-ancestors 'self';" header. Any thoughts on alternative measures that can be implemented besides depending solely on the CSP header? |
We have had a similar attempt at my company. All that was shown as evidence was a sign in page on their localhost as well as the HTML from that page they were hosting. Just to reaffirm others, @pauliusjacionis is correct as far as I can tell with a quick dive into it. |
Proxy servers can strip headers, meta tags, and modify HTML. The suggested solution would not fix the "vulnerability". This is a scam. There is no vulnerability, and there is no fix. The scammers claim they can clickjack your website, but that is not what is happening. They are clickjacking a different domain name. Sure, it appears to be your website, but it is not. It's just a live copy of your website. They could simply upload a copy of your website's HTML on their server and achieve the same result—no proxy needed. |
Thanks for posting the clarification. Bug bounty scammers are still active. Please consider pinning this issue or add a small reference in the readme |
+1, just received one too and was highly sceptical as usual (I couldn't see how this could be exploited for real) but I didn't know about this so I investigated a bit to learn about the CSP attribute they mention. Thanks for confirming here as it saved me some reading and testing 🙇♂️ . I guess this is a good "vulnerability" for the scammers because it is:
As I checked this project right after receiving the report, I agree with @HansSchouten it would be nice to add some line to the readme just to warn the future victims and save them some time. I understand this shouldn't be the responsibility of the library writer to deal with scammers, but unfortunately I don't see a better place to help the targets. |
We are facing the same scammers, thank you for unambiguous information! :) |
Hello everyone,
I recently received an email from a "security researcher" who used the X-Frame-Bypass library to report an "X-Frame-Options bypass bug". They were expecting a bug bounty payment.
I want to draw attention to this: the library DOES NOT actually bypass X-Frame-Options; it only creates the illusion of a bypass. Because traffic is proxied through a different domain name, session data and cookies are lost. This "bypass" is entirely harmless.
Be cautious of bug bounty scams and fraudulent security researchers.
The text was updated successfully, but these errors were encountered: