Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

One that's particularly annoying to me a while ago was you cannot drag and drop elements from an iframe to another iframe from another domain. IIRC it was only an issue in Chrome.


To be fair, you can't blame them for disallowing things like that. Protection against cross-site scripting, I'm sure.


I just don't see a realistic attack vector with cross-origin drag-n-drop.


This one's actually pretty easy: clickjacking.

Imagine permitting cross-origin drag-n-drop and a page is clickjacked: the user may end up dragging a sensitive item in the clickjacked page into an invisible iframe with a drop point layered on top of whatever target the user thinks they're dropping data into, and the end result would be that data intended for one endpoint, in this case the endpoint that was clickjacked, is sent to another.

It'd be a nontrivial attack to mount, but as you posed the challenge, I can see it done as part of e.g. a phish where a site like dropbox is iframed in a clickjacking attack (assuming they haven't mitigated it).

I can sketch (literally) what the dom might physically look like if it helps convey the attack I have in mind more effectively.


Here's some stuff you used to be able to do by combining UI-redressing (clickjacking) with cross-origin drag and drop.

https://www.contextis.com/media/downloads/Context-Clickjacki...

There have also been plenty of UXSS bugs in various browsers caused by cross-origin drag-and-drop.


Anything cross-origin is a potential XSS attack.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: