Web Application Potentially Vulnerable to Clickjacking #532
Replies: 4 comments
-
|
Thanks for the report. I think we should solve this consistently across the Prometheus ecosystem because it affects all web UIs (i.e. also Prometheus server and Alertmanager). A problem I could see is that some users do want to put the UI into an iframe. Note that you can already set an X-Frame-Options header via the So maybe this is already working as intended, as in: If you are in a situation where you need to set X-Frame-Options, you already can? |
Beta Was this translation helpful? Give feedback.
-
Thank you for your response. |
Beta Was this translation helpful? Give feedback.
-
|
I'm not a docker-compose expert, but generally, you need to pass in the flag |
Beta Was this translation helpful? Give feedback.
-
|
I'll convert this into a discussion, as it indeed seems to "work as intended". If you believe the current behavior is not sufficient, please raise a bug in https://github.com/prometheus/exporter-toolkit , as this is where all Prometheus projects get their web serving capabilities from. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
The remote web server does not set an X-Frame-Options response header or a Content-Security-Policy 'frame-ancestors' response header in all content responses. This could potentially expose the site to a clickjacking or UI redress attack, in which an attacker can trick a user into clicking an area of the vulnerable page that is different from what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions.
X-Frame-Options has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors.
Content-Security-Policy (CSP) has been proposed by the W3C Web Application Security Working Group, with increasing support among all major browser vendors, as a way to mitigate clickjacking and other attacks. The 'frame-ancestors' policy directive restricts which sources can embed the protected resource.
Return the X-Frame-Options or Content-Security-Policy (with the 'frame-ancestors' directive) HTTP header with the page's response. Read more about what Clickjacking is: https://www.synopsys.com/glossary/what-is-clickjacking.html#:~:text=Clickjacking%20is%20an%20attack%20that,describes%20what%20is%20going%20on.
Output:
The following pages do not use a clickjacking mitigation response header and contain a clickable event :
Beta Was this translation helpful? Give feedback.
All reactions