Cockpit (and its plugins) do not seem to protect itself against clickjacking. It is possible to render a page from a cockpit server via another website, inside an <iFrame> HTML entry. This may be used by a malicious website in clickjacking or similar attacks.
{
"binaries": [
{
"binary_version": "164-1",
"binary_name": "cockpit"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-bridge"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-dashboard"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-docker"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-machines"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-networkmanager"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-packagekit"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-storaged"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-system"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-tests"
},
{
"binary_version": "164-1",
"binary_name": "cockpit-ws"
}
]
}
{
"binaries": [
{
"binary_version": "215-1",
"binary_name": "cockpit"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-bridge"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-dashboard"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-machines"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-networkmanager"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-packagekit"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-pcp"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-storaged"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-system"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-tests"
},
{
"binary_version": "215-1",
"binary_name": "cockpit-ws"
}
]
}