Vulnerability Report [Click-Jacking]

12 views
Skip to first unread message

Whitehat Security

unread,
Oct 8, 2025, 1:35:46 AM10/8/25
to ontobee...@googlegroups.com

Hi Team.  

I am an security researcher and I have found a bug in your website    https://ontobee.org  
The details of it are as follows:-

CLICK-JACKING.

Description :

Click-jacking, also known as a "UI redress attack" is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.

Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of style-sheets, I-frames, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.

Impacts: 

1.       Tricking a user into unknowingly clicking on things and then gaining access to his account 
2.       An attacker can gain access to the credentials of users and use those credentials for booking and payment. 
3.       Adding events to their profile they are interested in attending. 
4.       editing their star rating on reviews
5.       Using their bank account details to books in hotels whereas the bill will go to their bank account.
6.       Bookmarking unwanted business.

POC:  

<html>

     <head>

     </head>

     <body>

                <h1>Click-Jacking In Your Site</h1>

         <iframe src="             https://ontobee.org                  "height="800" width="1300">

         </iframe>

     </body>

</html>

Waiting for your reply.


Regards

POC

image.png



Whitehat Security

unread,
Oct 21, 2025, 1:00:18 AM10/21/25
to ontobee...@googlegroups.com
Dear Team,

I hope you're doing well. I wanted to follow up on the vulnerability I reported. I understand that security assessments and fixes take time, and I truly appreciate your team's efforts in addressing these issues.

Please confirm your interest if you are willing to fix the issue to avoid further follow-ups. If you have already fixed the issue, please let us know, and we will proceed with retesting.

As a security researcher, I responsibly reported this vulnerability to help secure your platform. In recognition of my efforts, I expect a reward, which can be sent via PayPal or bank transfer. I would appreciate an update on this discussion as well.

Looking forward to your response.

Best regards

Whitehat Security

unread,
Oct 29, 2025, 12:18:53 AM10/29/25
to ontobee...@googlegroups.com
Hello Team,

I’m following up once more regarding the vulnerability report. We’re happy to know you’ve received it and that it’s contributing to your security improvements.

As mentioned earlier, we would also appreciate a reward for the vuln, granted purely at your discretion. This doesn’t require a bug bounty program — it’s simply a way to acknowledge the effort put into reporting it ethically.

Thank you for your time and acknowledgment.

Best regards

Whitehat Security

unread,
Nov 10, 2025, 11:50:15 PM11/10/25
to ontobee...@googlegroups.com
Hello Team,

I hope everything is going well on your end. I wanted to politely follow up regarding the vulnerability we reported earlier.

While our main goal is to help improve your security posture, we would also welcome a reward for the vuln, should you decide to grant one. We fully understand this is not an obligation and depends entirely on your room and discretion.

Your acknowledgment and appreciation mean a lot to us.

Best regards

Whitehat Security

unread,
Nov 26, 2025, 10:44:01 AM11/26/25
to ontobee...@googlegroups.com
Hello Team,

I hope this message finds you well. This is a gentle follow-up regarding the vulnerability report we submitted. Our intention has always been to responsibly disclose the issue and ensure the security of your platform.

As mentioned before, a reward is not something we expect by default, nor does it require a formal bug bounty program. It’s simply a gesture of appreciation that’s entirely at your discretion and room.

We’ll always value your acknowledgment of the report, and if you decide to provide a reward for reporting the bug ethically, we would greatly appreciate it.

Thank you for your time, and we remain open to assist further whenever you need.

Best regards

Whitehat Security

unread,
Dec 12, 2025, 12:02:39 AM12/12/25
to ontobee...@googlegroups.com
Hello Team,

This will be my follow-up regarding the vulnerability report we submitted. We’re happy to have contributed to your security and will always be open to supporting your future security needs.

We would also be grateful if you considered a reward for the vuln, as a gesture of appreciation for the ethical reporting. Again, we recognize this is not required and it depends completely on your discretion.

Thank you for your acknowledgment and for taking the time to review our report.

Best regards

He, Oliver

unread,
Dec 12, 2025, 8:40:28 AM12/12/25
to Whitehat Security, ontobee...@googlegroups.com

Thanks for reporting!

 

We will review it and act accordingly.

 

Best,
Oliver  

 

From: ontobee...@googlegroups.com <ontobee...@googlegroups.com> On Behalf Of Whitehat Security
Sent: Friday, December 12, 2025 12:02 AM
To: ontobee...@googlegroups.com
Subject: Re: Vulnerability Report [Click-Jacking]

 

External Email - Use Caution

 

 

--
You received this message because you are subscribed to the Google Groups "Ontobee-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ontobee-discu...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ontobee-discuss/CAPPdiEu6UaxQKUjQKceu8F%2BZQQtBR8KCCTwjNE_BZLb_Qb5KsA%40mail.gmail.com.

**********************************************************
Electronic Mail is not secure, may not be read every day, and should not be used for urgent or sensitive issues
Reply all
Reply to author
Forward
0 new messages