[ 
https://issues.apache.org/jira/browse/HADOOP-12964?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Haibo Chen updated HADOOP-12964:
--------------------------------
    Description: 
Nessus report shows a medium level issue that "Web Application Potentially 
Vulnerable to Clickjacking" with the description as follows:

"The remote web server does not set an X-Frame-Options response header in all 
content responses. This could potentially expose the site to a clickjacking or 
UI Redress attack wherein an attacker can trick a user into clicking an area of 
the vulnerable page that is different than what the user perceives the page to 
be. This can result in a user performing fraudulent or malicious transactions"

We could add X-Frame-Options, supported in all major browsers, in the Http 
response header to mitigate the issue.

  was:
Nessus report shows a medium level issue that "Web Application Potentially 
Vulnerable to Clickjacking" with the description "The remote web server does 
not set an X-Frame-Options response header in all content responses. This could 
potentially expose the site to a clickjacking or UI Redress attack wherein an 
attacker can trick a user into clicking an area of the vulnerable page that is 
different than what the user perceives the page to be. This can result in a 
user performing fraudulent or malicious transactions"

We could add X-Frame-Options, supported in all major browsers, in the Http 
response header to mitigate the issue.


> Http server vulnerable to clickjacking 
> ---------------------------------------
>
>                 Key: HADOOP-12964
>                 URL: https://issues.apache.org/jira/browse/HADOOP-12964
>             Project: Hadoop Common
>          Issue Type: Bug
>            Reporter: Haibo Chen
>            Assignee: Haibo Chen
>
> Nessus report shows a medium level issue that "Web Application Potentially 
> Vulnerable to Clickjacking" with the description as follows:
> "The remote web server does not set an X-Frame-Options response header in all 
> content responses. This could potentially expose the site to a clickjacking 
> or UI Redress attack wherein an attacker can trick a user into clicking an 
> area of the vulnerable page that is different than what the user perceives 
> the page to be. This can result in a user performing fraudulent or malicious 
> transactions"
> We could add X-Frame-Options, supported in all major browsers, in the Http 
> response header to mitigate the issue.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to