Any #security concerns about allowing a login form in an #iframe from anywhere (any ancestor)?

On one hand, that sounds like security degradation, on the other hand, Paypal uses iframe for payment ...

#cybersecurity #owasp

The answer was in the OAuth spec itself. To avoid Clickjacking attack, the OAuth flow should be avoided in an iframe.

https://datatracker.ietf.org/doc/html/rfc6749#section-10.13

RFC 6749: The OAuth 2.0 Authorization Framework

The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]

IETF Datatracker

The question remains for Paypal. Payment form sounds critical as well and could be victims of the same Clickjacking attack type, no?

If anyone knows, curious to understand how @paypaldev manages this threat type with Paypal iframes.