<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Clickjacking mitigation</title><link>https://community.sophos.com/utm-firewall/f/web-server-security/113752/clickjacking-mitigation</link><description>I&amp;#39;m presenting a web server through the WAF using Form authentication to restrict access. This was recently scanned, and came up vulnerable to Clickjacking attacks. Is there a way to add an X-Frame-Options or Content-Security-Policy: frame-ancestors header</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Clickjacking mitigation</title><link>https://community.sophos.com/thread/409282?ContentTypeID=1</link><pubDate>Tue, 16 Jul 2019 11:56:47 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:a2229459-7891-4c21-a06b-b8bb74c2ce76</guid><dc:creator>DouglasFoster</dc:creator><description>&lt;p&gt;I have tried to understand this several time, and found the issue difficult to grasp.&amp;nbsp; &amp;nbsp;Here is my attempt to restate the threat, partly for documentation and partly to get feedback if I have it wrong:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;User gets tricked to a bad-guy site, which loads an invisible page which allows him to intercept everything the user clicks or types.&lt;/li&gt;
&lt;li&gt;The user then navigates to your site, which is loaded into the bad-guy site as included content.&lt;/li&gt;
&lt;li&gt;The user attempts to do something on your site, but the bad guy gets the click and intercepts it to do something different or something extra.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The headers are a workaround to prevent being embedded in the wrong places:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Top-level pages should say &amp;quot;I should never be embedded in another web page&amp;quot;.&lt;/li&gt;
&lt;li&gt;Embedded pages should say &amp;quot;I should only be embedded in specific sites&amp;quot;, where the specific site can be &amp;quot;same server as this code&amp;quot; or a list of servers.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Then the browsers check to see if your content is embedded someplace where it does not belong.&lt;/p&gt;
&lt;p&gt;Wikipedia says that&amp;nbsp;X-Frame-Options is older while&amp;nbsp;Content-Security-Policy is the newer, and fully standardized version.&amp;nbsp; &amp;nbsp;The newer one is preferred but it is acceptable to use both to cover all bases.&lt;/p&gt;
&lt;p&gt;From a web design standpoint, you need to know what stuff is embedded where, so it helps to have a development environment that helps you keep track of this stuff.&lt;/p&gt;
&lt;p&gt;Not sure how big a risk this is, and it is technically not your problem.&amp;nbsp; &amp;nbsp; You can probably use the UTM login page templates to add the header, but User Portal was not modifiable in 9.5.&amp;nbsp; &amp;nbsp;Has that changed in 9.6?&amp;nbsp; &amp;nbsp;And&amp;nbsp; you need to worry about whether the back-end WAF application complies with the policy and continues to assert it.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Clickjacking mitigation</title><link>https://community.sophos.com/thread/409269?ContentTypeID=1</link><pubDate>Tue, 16 Jul 2019 10:38:51 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:296b684d-15d9-4906-ab4e-634c7c2ca3f7</guid><dc:creator>Jaydeep</dc:creator><description>&lt;p&gt;Hi &lt;a href="/members/steveu"&gt;SteveU&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I don&amp;#39;t think there&amp;#39;s an option as&amp;nbsp;such in WAF.&amp;nbsp;In general, X-FRAME-OPTIONS is the web application&amp;#39;s way to control how it&amp;#39;s allowed to be presented the client-side, so&amp;nbsp;don&amp;#39;t you need to set this up&amp;nbsp;in the backend application and not in WAF?&lt;/p&gt;
&lt;p&gt;However, you can add a feature request for this &lt;a href="https://ideas.sophos.com/forums/17359-sg-utm" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>