# EN | Clickjacking to Account Takeover via Drag&Drop

September 27, 2020

In August of this year, I found a Clickjacking vulnerability in a dutch company. Later I realized that this vulnerability could be upgraded to Account Takeover. Then, I coded a PoC template with CSS and reported the vulnerability. And they fixed this vulnerability and rewarded me with a €€€ bounty. I don’t say the company, because they want to remain confidential.

### Recon

I was reviewing the responses by sending requests to the system. When I looked at response header, I saw that the X-Frame-Options attribute was not set. This was causing the Clickjacking vulnerability.

### Impact Escalation

I saw there was a control panel page for users. Also, due to the system, when the e-mail address was changed, user accounts could be taken over.

Template Source: https://pastebin.ubuntu.com/p/WKtVKBBd4F/

I coded a template using the drag&drop feature with CSS and HTML.

### Reported

I can hear what you think. Yes, Since the drag & drop feature is used, the impact of the vulnerability is reduced. However, it is still a weakness that is likely to cause serious damage. I reported the vulnerability, and we agreed with the company that it should be fixed.

### The end :

7 August 2020 - Report sent
8 August 2020 - Confirmed
11 August 2020 - I was awarded a €€€ bounty

Tags: