Hey Team,
I am a security researcher. I have found the following bug in your site.(web) Bug type : UI Redress Impact : Phishing (account compromise) Description : Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker. POC: <html> <head></head> <body> <h1>WEBSITE IS VULNERABLE TO CLICKJACKING</h1> <iframe width=100% height=80% src="https://bash-hackers.org"></iframe> </body> </html> Impact: The site can also be opened in an iframe after the user has logged in making it hard for the user to avoid phishing.A user can be tricked into entering his credentials in the placeholder for the original website details. And thus his credentials would be sent to the attacker. Remediation : Add an X-Frame-Options Header in the header of the website Or you can use "Content-Security-Policy" header to set frame rules.For more information you can visit this link. (https://cheatsheetseries.owasp.org/cheatsheets/Clickjacking_Defense_Cheat_Sheet.html). Note: I am attaching a screenshot as a POC. Hoping for a bounty for responsibly disclosing this report to your website. Waiting for your reply. Regards Syed Maaz