Fix/clickjacking vulnerability fix#29
Conversation
…tion/proxy-nginx.conf
ibi420
left a comment
There was a problem hiding this comment.
This directly fixes the clickjacking vulnerability. From my test following the methods outlined in the documentation from Appattack, I was able to replicate this attack and confirm that this fix effectively stops the attack.
lachlan-robinson
left a comment
There was a problem hiding this comment.
Hey @atharv02-git, well done addressing the clickjacking vulnerability.
-
X-Frame-Options: DENYprevents the page from being framed by any site, which will mitigate clickjacking attacks as intended. -
frame-ancestors 'none'is a more modern approach which addresses the issue as well. - Overall, you have addressed the clickjacking concern here with redundancy which is good.
aNebula
left a comment
There was a problem hiding this comment.
LGTM.
Please open an upstream PR against 9.x branch of doubtfire-deploy .
In the description add reference of the upstream of thoth-tech/doubtfire-web#322 and vice-versa.
Hi @aNebula, |
Base Branch: 8.0.x
Note: Making a PR to thoth-tech/doubtfire-deploy branch only for peer review purpose.
Description
proxy-nginx.conffile used in production. These headers are now enforced at the outer reverse proxy layer (doubtfire-deploy) to ensure consistent protection across all services.Note
Kindly go through the attached documentation first inorder to understand what this fix is about in detail and how it can be tested.
What was changed:
production/shared-files/proxy-nginx.confFixes # (Clickjacking vulnerability (AppAttack finding))
Type of change
How Has This Been Tested?
Testing Checklist:
Checklist: