How to Configure the X-Frame-Options Header to Mitigate Clickjacking Attempts Using OHS and WLS Applications
(Doc ID 2040420.1)
Last updated on JUNE 26, 2018
Oracle WebLogic Server - Version 10.3.2 and later Oracle Fusion Middleware - Version 188.8.131.52.0 and later Oracle HTTP Server - Version 184.108.40.206.0 and later Oracle WebCenter Content - Version 220.127.116.11.0 to 18.104.22.168.0 [Release 11g] Information in this document applies to any platform.
- This concept applies to all versions
General Use Case to Configure X-Frame-Options Header to Mitigate Clickjacking Attempts
X-Frame-Options is a server-side method of combating clickjacking -- see https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet or http://en.wikipedia.org/wiki/Clickjacking for more information on both. Clickjacking, also known as a UI redress attack, is a method in which an attacker uses multiple transparent or opaque layers to trick a user into clicking a button or link on a page other than the one they believe they are clicking. Thus, the attacker is "hijacking" clicks meant for one page and routing the user to an illegitimate page.
Web site administrators should take precautions to protect your webpages from clickjacking attempts. Clickjacking is not a security issue unique to Oracle HTTP Server or Oracle Weblogic Server. This is an issue that concerns any server that serves up web pages.
A common method considered clickjacking is to use the HTML iframe feature to embed another server's page within a given site's page. Note this is not a bad thing in itself. It is used for many good purposes as an HTML feature to create an integrated experience. The objection occurs when a third-party site includes details surrounding the displayed iframe to trick a user. Or, they simply have no permission to include your page within theirs. The question is, how to prevent this?
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!