
Cloud Vulnerability DB
A community-led vulnerabilities database
Hashicorp Boundary v0.8.0 contains a Clickjacking vulnerability (CVE-2022-36182) that allows attackers to intercept login credentials and redirect users to malicious destinations. The vulnerability was disclosed in October 2022 and affects the web interface of Boundary (NVD).
The vulnerability is a UI redress attack where an attacker can embed the Boundary login interface in a transparent or opaque iframe and trick users into clicking on malicious elements while believing they are interacting with legitimate content. This type of attack allows the attacker to hijack user clicks and potentially capture sensitive information like login credentials (OWASP).
If successfully exploited, the vulnerability could allow attackers to capture user login credentials and redirect users to malicious destinations. This could lead to unauthorized access to Boundary systems and potential compromise of protected resources (PacketStorm).
The vulnerability can be mitigated by implementing proper frame-ancestors directives in the Content Security Policy (CSP) headers, using X-Frame-Options headers to prevent framing from unauthorized domains, and setting appropriate SameSite cookie attributes. Additionally, implementing frame-breaking JavaScript code can provide an additional layer of defense (OWASP).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."