Protect pages from clickjacking
Summary
Web pages must be protected from being embedded in malicious sites (clickjacking).
Description
Clickjacking is a malicious technique often used in phishing attacks. By using it, attackers may deceive users and make them perform actions other than the ones they perceive, which may cause them to reveal confidential information. Web servers can protect pages they host to a great extent by including headers in their responses that prevent the pages from being embedded in malicious sites (e.g., "X-Frame-Options").
References
- OWASP10-A7. Identification and authentication failures
- AGILE-9. Continuous attention to technical excellence and good design
- MITRE-M1013. Application developer guidance
- MITRE-M1021. Restrict web-based content
- CMMC-CA_L2-3_12_2. Plan of action
- WASC-A_18. Credential and session prediction
- MVSP-2_3. Application design controls - Security Headers
- PCI-6_4_1. Public-facing web applications are protected against attacks
Weaknesses
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.
Supported In
This requirement is verified in following services
Essential Plan
Advanced Plan