Description
When an inline frame tag (<iframe>) on a webpage references an external resource without the sandbox attribute set, it allows the external URL to manipulate the content within the frame. This can potentially trick users into performing unintended actions, such as submitting passwords or interacting with malicious content.
Recommendation
Mitigate this risk by setting the sandbox attribute for iframes that reference external URLs. The sandbox attribute provides a restricted environment for the iframe’s content, limiting its capabilities and enhancing security.
References
Related Issues
- Drupal7 Pre Auth SQLI - CVE-2014-3704
- Host Header Injection - Vulnerability
- Internal Server Error - Vulnerability
- Passive Mixed Content - Vulnerability
- Tags:
- Cross-Origin Resource Sharing
Anything's wrong? Let us know Last updated on May 13, 2024