akersten 4 hours ago

This is all solved by developers properly setting the X-Frame-Options header but I bet instead we'll delete half the SVG spec from the browser in some futile chase of security

  • umvi 9 minutes ago

    SVGs have a lot of security landmines; it's simplest to just disallow them, especially if they are untrusted (user provided)

  • rebane2001 4 hours ago

    it's not all solved because some applications require framing (eg google docs), and you can run this attack against a non-frame target, such a website with html injection, but strict CSP

autoexec 18 hours ago

I already keep SVG disabled for security reasons, but it's increasingly looking like I'll have to find some way to disable CSS too. It's too bad people couldn't leave CSS alone as a nice simple (sort of) way to format text because turning it into another programing langue is begging for it to be abused by hackers and other malicious actors (like advertisers) just like JS

  • bawolff 14 hours ago

    > It's too bad people couldn't leave CSS alone as a nice simple (sort of) way to format text

    The base form of this attack goes back to the original CSS 1.

    Honestly you are massively overreacting. This type of attack was much much easier to pull off in the late 2000s then it is now. Its basically impossible in practise now a days.

  • drysart an hour ago

    CSS isn't the security issue here. IFrames are the security issue; and have been since the first day they were added to a browser.

  • designerarvid 12 hours ago

    Maybe I’m a too much of a normie to understand, but surely keeping your secure data away from your browser must be better than securing the browser to the point that it stops working?

    • notachatbot123 11 hours ago

      Any service that is exposed as a website that has data which you would like to keep secure = potentially hacked through attacks like these. It's usually not possible to choose to not have data available on internet connected services sadly.

      • designerarvid 10 hours ago

        Of course, by why not access those particular services in a more secure way? With other browser settings, another browser, or another machine altogether?

        Turning off JS permanently is like keeping your wallet in a safe you carry around all the time because once in a while you need to visit the dangerous parts of the town.

        • djoldman 9 hours ago

          I have JS off by default and click one button to turn it on per website. You might be surprised how much faster the web is and how often you don't need JS.

      • ruined 4 hours ago

        use browsing containers to restrict access to specific contexts and this kind of thing basically can't happen

  • VerifiedReports 12 hours ago

    What security reasons (other than that cited by this demo, which doesn't seem to work on most platforms)?

  • paulpauper 18 hours ago

    nah, that is overkill. the probability of falling for this is still tiny and it cannot break the sandbox, steal session cookies, or anything like that .

    • autoexec 14 hours ago

      Sandbox escapes are discovered all the time (pretty sure I've read about a few just this past week) and there are a lot of other problems CSS can enable (ads, fingerprinting, etc)

  • est 16 hours ago

    why not disable javascript once and for all.

    Most site shouldn't run any js after content is loaded.

    I hope there's something like <body onload="js.disable()">

    I can only do it manually in DevTool.

    • rebane2001 12 hours ago

      As a user: Browsers let you manually disable JS, but you can also use an extension such as NoScript (I do).

      As a web developer: You can use Content Security Policy to limit or disable JS, as well as other resources such as CSS and images.

    • bawolff 14 hours ago

      That's not relavent to the attack discussed in the article. These types of attacks do not involve javascript, nor could they due to the same origin policy.

    • pcthrowaway 14 hours ago

      Why on earth would you want to load JS before content is loaded but not after? If you are able to assemble the page based on data sources before loading the page, you can just server-render the damn thing and disable JS altogether?

      JS is essential for polished UX when you have highly interactive components. Technically mapquest got server-rendered interactive maps working, but no one would choose that over the usability of Google Maps or OpenStreetMaps today

      • est 13 hours ago

        > Why on earth would you want to load JS before content is loaded but not after?

        apparently, single-page-apps is an unstoppable trend. I tried to disable JS and 99% site won't work.

        But for content sites, after the article is loaded, disabling JS provides a much better reading experience.

        > but no one would choose that over the usability of Google Maps or OpenStreetMaps today

        That's a valid use for JS. But if you think about it, can we make a js free map tool using technics from OP's article? https://codepen.io/rebane2001/details/OPVQXMv

    • autoexec 15 hours ago

      I've got noscript which at least keeps JS off by default and allows me to selectively enable scripts by domain. Now I just a similar tool for CSS. Something that whitelists a sane set of features that can't be used (at least as easily) for interactivity, ads, fingerprinting, and other malicious activity while letting me explicitly blacklist annoyances (like scrollbar styles or sticky headers). The way things are going I'll probably need something similar for HTML too.

    • kg 15 hours ago

      Does JS protect against this particular attack? It seems like it's mostly implemented in CSS and SVG.

PBnFlash 13 hours ago

Reminds me of the flash player hack that would trick people into enabling system storage while hiding the menus. Vectors just can't help themselves

zephraph 16 hours ago

The SVG adder is art. Love it.

  • cachius 9 hours ago

    Such a powerful demo. TIL I learned that functional complete is necessary but not sufficient for Turing completeness, for which you need storage and random access to it. Which you can probably implement somehow but not easily performant, and not in infinite dimensions.

    https://stackoverflow.com/questions/4908893/what-logic-gates...

user_7832 9 hours ago

Not sure if this is the same for others, but on my android chrome (technically kiwi browser, latest release), perhaps due to the inbuilt dark mode, stuff looks just "fine" or broken. Anyone else noticing such a thing?

  • mzs 6 minutes ago

    A zoom of not 100% breaks the QR one at least.

  • williamscales 4 hours ago

    Yeah I had to turn off dark reader in firefox to see the examples "properly".

lambdaone 7 hours ago

This is really impressive work. I'm not sure how this gets fixed, but it needs to be fixed, and soon.

timwis 10 hours ago

What a cool post! Really enjoyed reading it.

scoofy 18 hours ago

As someone who runs a site that uses inline SVG, this is unfortunate. Hopefully it won't be a problem for me.

  • pixl97 18 hours ago

    Maybe I'm missing something, but it looks like it requires an iframe attack or an XSS to work correctly, both of which have page/server settings that can be used to avoid them.

    • spartanatreyu 16 hours ago

      It's easy to prevent clickjacking attacks by not allowing your website to be embedded in an iframe.

      You can do that by either adding a header to your network requests, o̶r̶ ̶b̶y̶ ̶a̶d̶d̶i̶n̶g̶ ̶t̶h̶e̶ ̶f̶o̶l̶l̶o̶w̶i̶n̶g̶ ̶m̶e̶t̶a̶ ̶t̶a̶g̶ ̶t̶o̶ ̶y̶o̶u̶r̶ ̶p̶a̶g̶e̶:̶

      ̶<̶m̶e̶t̶a̶ ̶h̶t̶t̶p̶-̶e̶q̶u̶i̶v̶=̶"̶X̶-̶F̶r̶a̶m̶e̶-̶O̶p̶t̶i̶o̶n̶s̶"̶ ̶c̶o̶n̶t̶e̶n̶t̶=̶"̶D̶E̶N̶Y̶"̶>̶

      EDIT:

      According to MDN, it will only work by adding it to your headers. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/...

bawolff 15 hours ago

That's cool and all, but clickjacking is really overrated and its easy to address via x-frame-options. Most attack scenarios are very convoluted and impractical in real life (doubly so now that samesite cookies and cookie storage partitioning is now a thing).

Basically i dont think anyone should worry about this.

  • creata 12 hours ago

    You're right that everyone should be using X-Frame-Options: DENY (for ancient browsers, plus CSP for newer browsers), but the author managed to pull it off on Google Docs. If even Google can't consistently stick to it, I feel like I should be worried.

    All website operators should read this imo: https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Headers_...

    • frigateengineer 7 hours ago

      > If even Google can't consistently stick to it

      Everything is a target. You can’t assume safety based on reputation or ubiquitousness.

      There are so many examples of the trusted well-used thing failing security to mention.

  • rebane2001 11 hours ago

    I don't think clickjacking is overrated, it's usually the opposite with it being not even accepted by many bug bounty programs.

    I've been able to make realistic attacks against multiple targets. Many services, such as Google Docs, need to enable cross-origin framing for their functionality.

    And beyond that, even if you restrict the framing, it might still be possible to clickjack as a part of a more complex attack chain, see: https://lyra.horse/blog/2024/09/using-youtube-to-steal-your-...

    And the attack in OP does not require iframes, so it can also be applied to injection attacks where CSP prevents javascript for example.

    (disclaimer: author of story)

  • mdriley 14 hours ago
    • cachius 11 hours ago

      SVG and CSS filters can leak cross-origin data via iframes from March 6, 2025

      Researchers have observed that, in Chrome:

      A hostile webpage can create SVG or CSS filters that cover an iframe on the same page and act on the iframe's content.

      Specially-crafted filters can be created that vary their performance characteristics (different use of memory bandwidth or compute resources) based on input data.

      The induced differences in load can, in turn, be used to leak the input data through a timing sidechannel readable from Javascript.

bindump 9 hours ago

I’m fine with people finding problems like this and trying novel things if they don’t hurt others. What I’m sick of is people that would rather hurt others to get money than to find some other way to live. If you really want to use your life as a test to see whether there’s a hell or not, do it some other way please.

Aldipower 11 hours ago

I want my Flash back! :-(

paulpauper 18 hours ago

A long time ago there was a facebook clickjacking method that could make someone inadvertently share a link or like a page. The former required clicking a combination of colored buttons and was quite clever. This was in 2010. But it could not do more, like steal sessions.