Oracle WebLogic Server Recommendations to Prevent Cross-Site Scripting (XSS) Attacks
(Doc ID 2407360.1)
Last updated on JULY 12, 2021
Applies to:Oracle WebLogic Server - Version 10.3.6 and later
Information in this document applies to any platform.
Some security scans may be requesting an action for these line items:
These are set as http headers to take advantage of browser XSS attack prevention features. This document is provided from an Oracle Weblogic Server perspective to help application developers and administrators mitigate Cross-Site Scripting (XSS) attacks.
If using Oracle HTTP Server in front of WebLogic Server, see <Note 2370975.1>, "Oracle HTTP Server Recommendations to Prevent Cross-Site Scripting (XSS) Attacks"
This document provided the same direction, however WLS has different requirements, features and includes an Oracle built WLS Console application at /console .
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document
|What are XSS attacks ?|
|When do they occur?|
|What happens in an XSS attack?|
|How to prevent such attacks?|