Last updated on MAY 19, 2017
Applies to:Oracle Fusion Middleware - Version 22.214.171.124.0 and later
Oracle HTTP Server - Version 126.96.36.199.0 and later
Oracle WebLogic Server - Version 10.3.2 and later
Information in this document applies to any platform.
- This concept applies to all versions
General Use Case to Configure X-Frame-Options Header to Mitigate Clickjacking Attempts
X-Frame-Options is a server-side method of combating clickjacking -- see https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet or http://en.wikipedia.org/wiki/Clickjacking for more information on both. Clickjacking, also known as a UI redress attack, is a method in which an attacker uses multiple transparent or opaque layers to trick a user into clicking a button or link on a page other than the one they believe they are clicking. Thus, the attacker is "hijacking" clicks meant for one page and routing the user to an illegitimate page.
Web site administrators should take precautions to protect your webpages from clickjacking attempts. Clickjacking is not a security issue unique to Oracle HTTP Server or Oracle Weblogic Server. This is an issue that concerns any server that serves up web pages.
A common method considered clickjacking is to use the HTML iframe feature to embed another server's page within a given site's page. Note this is not a bad thing in itself. It is used for many good purposes as an HTML feature to create an integrated experience. The objection occurs when a third-party site includes details surrounding the displayed iframe to trick a user. Or, they simply have no permission to include your page within theirs. The question is, how to prevent this?
Sign In with your My Oracle Support account
Don't have a My Oracle Support account? Click to get started
Million Knowledge Articles and hundreds of Community platforms