Can X-Frame-Options HTTP Header be Enabled in Oracle WebLogic Server to Mitigate Clickjacking?
(Doc ID 1558254.1)
Last updated on SEPTEMBER 11, 2020
Applies to:Oracle WebLogic Server - Version 10.3 and later
Information in this document applies to any platform.
Setting X-Frame-Options http header is a server-side method of combating clickjacking -- see https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet or http://en.wikipedia.org/wiki/Clickjacking for more information on both. Clickjacking, also known as a UI redress attack, is a method in which an attacker uses multiple transparent or opaque layers to trick a user into clicking a button or link on a page other than the one they believe they are clicking. Thus, the attacker is "hijacking" clicks meant for one page and routing the user to an illegitimate page.
Web site administrators are often asked to take precautions to protect your webpages from clickjacking attempts. Clickjacking is not a security issue unique to Oracle HTTP Server or Oracle Weblogic Server. This is an issue that concerns any server that serves up web pages.
A common method considered clickjacking is to use the HTML iframe feature to embed another server's page within a given site's page. Note this is not a bad thing in itself. It is used for many good purposes as an HTML feature to create an integrated experience. The objection occurs when a third-party site includes details surrounding the displayed iframe to trick a user. Or, they simply have no permission to include your page within theirs. The question is, how to prevent this?
This document provided options available for applications deployed to Oracle WebLogic Server.
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document