Cockpit (and its plugins) do not seem to protect itself against clickjacking. It is possible to render a page from a cockpit server via another website, inside an <iFrame> HTML entry. This may be used by a malicious website in clickjacking or similar attacks.
{
"binaries": [
{
"binary_name": "cockpit",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-bridge",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-dashboard",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-docker",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-machines",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-networkmanager",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-packagekit",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-storaged",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-system",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-tests",
"binary_version": "164-1"
},
{
"binary_name": "cockpit-ws",
"binary_version": "164-1"
}
]
}
{
"binaries": [
{
"binary_name": "cockpit",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-bridge",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-dashboard",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-machines",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-networkmanager",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-packagekit",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-pcp",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-storaged",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-system",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-tests",
"binary_version": "215-1"
},
{
"binary_name": "cockpit-ws",
"binary_version": "215-1"
}
]
}