activemq-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Michael Furman (JIRA)" <>
Subject [jira] [Created] (AMQ-6113) Security issue: required to add "X-Frame-Options SAMEORIGIN" for web console
Date Thu, 07 Jan 2016 14:22:39 GMT
Michael Furman created AMQ-6113:

             Summary: Security issue: required to add "X-Frame-Options SAMEORIGIN" for web
                 Key: AMQ-6113
             Project: ActiveMQ
          Issue Type: Bug
          Components: security, webconsole
         Environment: centos 6
            Reporter: Michael Furman

ActiveMQ is part of our installation.

When I run the Nessul scunner on our server it found the following vulnerability on ActiveMQ

Web Application Potentially Vulnerable to Clickjacking

The remote web server does not set an X-Frame-Options response header in all content responses.
This could potentially expose the site to a clickjacking or UI Redress attack wherein an attacker
can trick a user into clicking an area of the vulnerable page that is different than what
the user perceives the page to be. This can result in a user performing fraudulent or malicious

X-Frame-Options has been proposed by Microsoft as a way to mitigate clickjacking attacks and
is currently supported by all major browser vendors.

Note that while the X-Frame-Options response header is not the only mitigation for clickjacking,
it is currently the most reliable method to detect through automation. Therefore, this plugin
may produce false positives if other mitigation strategies (e.g frame-busting JavaScript)
are deployed or if the page does not perform any security-sensitive transactions.
Return the X-Frame-Options HTTP header with the page's response.

This prevents the page's content from being rendered by another site when using the frame
or iframe HTML tags.
See Also

    The following pages do not use an X-Frame-Options response header :


This message was sent by Atlassian JIRA

View raw message