Incident Report 072321 - X-Frame header not set
ANALYSIS RESULTS
Below is the complete analysis and results.
SUMMARY OF REPORT
Customers is US Commercial region identified a security vulnerability that could cause framesniffing and clickjacking issues in VIDIZMO website.
It was reported that the VIDIZMO website does not include use of X-FRAME-OPTIONS which is recommended in setting up websites where user interaction is required for one-click authentication.
FINDINGS
Framesniffing is an attack technique that takes advantage of browser functionality to steal data from a website.
Clickjacking is a malicious technique to trick a web user into clicking on something different from what the user actually perceives, which can infect a machine with malware that potentially reveals confidential information or takes control of the user's computer and/or Username.
Administrators can mitigate framesniffing by configuring IIS to send an HTTP response header that prevents content from being hosted in a cross-domain IFRAME.
The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a ,
VIDIZMO offers as part of its default features. VIDIZMO provides security update to resolve this vulnerability based on special conditions (if required) as per customers' security needs.
TOOLS
For the execution of this project, the most up-to-date versions of the following tools and components associated with them were used:
LINE OF ACTION AND ASSOCIATED TIMELINES
The following table outlines actions performed and their schedule to remediate security issues and vulnerabilities.
REMEDIATION PROCEDURE
Below is the detail about actions performed to remove security vulnerabilities.
DETAIL OF VULNERABILITIES
This section provides complete detail of vulnerabilities identified during the assessment procedure.