My Oracle Support Banner

Cross-side Scripting Vulnerability -OSB Console (Doc ID 2732663.1)

Last updated on NOVEMBER 30, 2020

Applies to:

Oracle Service Bus - Version 12.2.1.3.0 and later
Information in this document applies to any platform.

Goal

On : 12.2.1.3.0 version, OSB Security

Cross-side scripting vulnerability -OSB Console


Customer needs following Response headers in OSB console application.

1. X-Frame-Options: deny or X-Frame-Options: sameorigin
2. X-Content-Type-Options: nosniff
3. Strict-Transport-Security: max-age=31536000 ; includeSubDomains
4. Content-Security-Policy: frame-ancestors self
5. X-Permitted-Cross-Domain-Policies: none
6. X-XSS-Protection: 1; mode=block
7. Access-Control-Allow-Origin: Web Services URL
a. Ex. Access-Control-Allow-Origin: https://cstmprdsoa53.cvp.cs
8. Cache-Control: no-cache, no-store
9. Pragma: no-cache
10. Set-Cookie:

The customer is requesting above response headers in osb console application as osb console application itself is getting flaged in customer's env during security scan.
 

Solution

To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!


In this Document
Goal
Solution
References


My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.