X-Frame-Options-Vulnerability/EN/Solution Tips: Unterschied zwischen den Versionen

Aus Siwecos
Wechseln zu: Navigation, Suche
Zeile 29: Zeile 29:
  
 
Here is an example of an .htaccess file which will set the '''Header Scanner''' to green.
 
Here is an example of an .htaccess file which will set the '''Header Scanner''' to green.
([[Htaccess|.htaccess example (German only]])
+
([[Htaccess/EN|.htaccess example]])

Version vom 20. März 2019, 11:57 Uhr

Set in the HTTP header according to your requirements. The X-Frame-Options field in the HTTP header can be used to determine whether a browser is allowed to render or embed the target page in a <frame>, <iframe> or <object>. Websites can use this header to deflect clickjacking attacks by preventing their content from being embedded in third party pages.

With the HTTP-Header command X-Frame-Options, modern web browsers can be instructed to prevent loading a page in a frame on another website. To do this, the following setting must be entered in the .htaccess file:

Header always append X-Frame-Options DENY

--snip

Header always append X-Frame-Options DENY

—snap

Alternatively, you can permit the page to be embedded only in other pages within the same domain:

--snip

Header always append X-Frame-Options SAMEORIGIN

—snap

If a website must be embedded in an external page, a domain can be specified:

--snip

Header always append X-Frame-Options ALLOW-FROM botfrei.de

—snap


Here is an example of an .htaccess file which will set the Header Scanner to green. (.htaccess example)