Content extraction is one of the recently documented UI redressing vectors. It exploits Firefox vulnerability that allows to display any URL
HTML source in an
iframe like this:
<iframe src="view-source:http://any-page-you.like/cookies-included">
With social engineering attacker tricks user into selecting (usually invisible) page source and dragging it to attackers' controlled
textarea. A simple demo is
here:
|
Drag & drop other page source (cross-domain) |
Once attacker gets the page source dropped into his textarea, he may begin to extract contents (like session IDs, user names, anti csrf tokens etc.) and launch further attacks.
However, this way of using the vector requires significant effort from a user and
is pretty difficult to exploit in real world situation (there's some clicking and dragging involved). Also, it will stop working once Mozilla
disallows cross origin drag & dropping.
I've found a neat way to do cross-origin content extraction that might be more suitable for some classes of websites. Ladies and gentleman, let me present
Fake Captcha: