Secure Apache from Cross-Frame Scripting on Ubuntu
A Cross-Frame Scripting (XFS) vulnerability can allow an attacker to load the vulnerable application inside an HTML iframe tag on a malicious page.
The attacker could use this weakness to devise a Clickjacking attack to conduct phishing, frame sniffing, social engineering, or Cross-Site Request Forgery attacks.
To defend Clickjacking attack on Apache web server, we can use X-FRAME-OPTIONS to avoid web application being hacked from Clickjacking attack.
Browser vendors have introduced and adopted a policy-based mitigation technique using the X-FrameOptions header. Developers can use this header to instruct the browser about appropriate actions to perform if their site is included inside an iframe.
Developers must set the X-Frame-Options header to one of the following permitted values: ·
DENY: - Deny all attempts to frame the page ·
SAMEORIGIN: -The page can be framed by another page only if it belongs to the same origin as the page being framed ·
ALLOW-FROM origin: - Developers can specify a list of trusted origins in the origin attribute. Only pages on origin are permitted to load this page inside an iframe
Comments
Post a Comment