on 01-19-2016 10:43 PM
Portal 7.31 Logon Page Clickjacking Vulnerability Question Our Internal Security has flagged our Portal Logon Page as having the Possibility of Clickjacking Vulnerability. Security have stated the following: The web server does not set an X-Frame-Options response header in all content responses. This could potentially expose the site to a clickjacking or UI Redress attack wherein an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions. Note that while the X-Frame-Options response header is not the only mitigation for clickjacking, it is currently the most reliable method to detect through automation. I thought SAP handled Clickjacking thru the coding of JSP’s but I cannot find any documentation to show our Security people I would like to know if and how SAP handles clickjacking in the Portal Logon Page? I would like to know if it is possible and how I would change the Portal Logon Page to include X-Frame-Options Any help on this matter would be greatly appreciated Thank you Sarah
Hi Sarah,
Please refer the note 2319727. SAP has given the steps to be performed in case of ABAP and JAVA for Clickjacking.
Regards,
Jegan Raj
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Nice one Jeganraj, thanks for sharing. Especially linked 2169722 is containing an important clue from my point of view:
"...Standard protection measures against Clickjacking (X-FRAME-OPTIONS header) are not suitable for common NetWeaver integration scenarios.
Therefore SAP is providing a whitelist based framework for NetWeaver technologies..."
Indeed, the 2319727 doesnt contains any specific informations, but rather is pointing to W3C etc... As I have mentioned you will need a concrete scenario, to be able to advise concrete measures
cheers
Hello,
We are experience similar issue with 7.3 and 7.4. Did you get any reply or update on this?
Thanks
Heather
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Heather Korycinski wrote:
Hello,
We are experience similar issue with 7.3 and 7.4. Did you get any reply or update on this?
Thanks
Heather
response headers like those:
can be added by the infrastructure, a reverse proxy e.g.
Prevention in genrally is well documented on wiki:
https://en.wikipedia.org/wiki/Clickjacking
As far I understood a scenario can be JS overlapping e.g., so your ep logon page is attacked by something, that tries to steal credentials e.g.
What is your concrete question resp exact scenario you are asking for?
cheers
Hi,
we are also struggeling with this. Isn't there an option to add this through the web dispatcher. I tried to add the header field as described in here
Defining Modification Actions - SAP Web Dispatcher - SAP Library
but it didn't worked.
Regards Stefan
Stefan, this is in fact another story imho, since you already obviously understood what the problem exactly is and how to avoid it. What you have here are problems on know how for SAP web dispatcher. From your problem description Im not clear what is meant with "but it didn't worked". I would suggest you to take a look here e.g.: resp describe your problems in the right section of SCN: your question is in fact an infrastructure question and is barely related to EP.
However, Im still not clear what your exact scenario is, since no one in this thread is describing the exact problem resp. a reproducing sequence
cheers
User | Count |
---|---|
86 | |
10 | |
9 | |
9 | |
9 | |
6 | |
6 | |
5 | |
3 | |
3 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.