Quantcast
Channel: Symantec Connect - Products - Discussions
Viewing all articles
Browse latest Browse all 18527

Web Application Potentially Vulnerable to Clickjacking

$
0
0
I need a solution

   Hi all,

 Can you please tell us how can we mitigate vulnerability "Web Application Potentially Vulnerable to Clickjacking".

Description
The remote web server does not set an X-Frame-Options response header in all content responses. This could potentially expose the site to a clickjacking or UI Redress attack wherein an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions.

X-Frame-Options has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors.

Note that while the X-Frame-Options response header is not the only mitigation for clickjacking, it is currently the most reliable method to detect through automation. Therefore, this plugin may produce false positives if other mitigation strategies (e.g frame-busting JavaScript) are deployed or if the page does not perform any security-sensitive transactions.

 
Solution
Return the X-Frame-Options HTTP header with the page's response.

This prevents the page's content from being rendered by another site when using the frame or iframe HTML tags.

 We have a Symantec Endpoint Protection Manager 12.1.6 MP2 installed on a Windows Server 2012 R2 machine. Affected ports are 8443 and 9090 which are used by SEPM. We have tried to find solution to our problem, but without any success. 

 Thanks in advance!

0

Viewing all articles
Browse latest Browse all 18527

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>