<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security vulnerablity :- HTTP secuirty headers not detected in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/security-vulnerablity-http-secuirty-headers-not-detected/m-p/86781#M26209</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We are using ACS 5.2.6 with Windows OS.&lt;/P&gt;&lt;P&gt;We have recieved the security vulnerablity (http secuirty headers not detected. And for that we have two solution which are given below:-&lt;/P&gt;&lt;P&gt;&lt;FONT size="7"&gt;1.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Security filters and clickjacking mitigation&lt;/P&gt;&lt;DIV class="region region-content"&gt;&lt;DIV class="node node-documentation-page node-promoted clearfix"&gt;&lt;DIV class="content"&gt;&lt;DIV class="field field-name-body field-type-text-with-summary field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;DIV class="body conbody"&gt;&lt;DIV class="abstract"&gt;&lt;SPAN class="shortdesc"&gt;You can configure a security filter,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;SecurityHeadersPolicy, that mitigates clickjacking attacks in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Alfresco Share&lt;/SPAN&gt;.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P class="p"&gt;SecurityHeadersPolicy&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a Java Servlet filter that applies HTTP response headers to incoming requests in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Share&lt;/SPAN&gt;. The headers that are returned are defined in a configuration section called&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;SecurityHeadersPolicy&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;alfresco-security-config.xml.&lt;/P&gt;&lt;DIV class="p"&gt;Three headers are added by default;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;X-Frame-Options,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;X-Content-Type-Options&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;X-XSS-Protection:&lt;PRE&gt;&lt;SPAN class="tag"&gt;&amp;lt;config&lt;/SPAN&gt; &lt;SPAN class="atn"&gt;evaluator&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;=&lt;/SPAN&gt;&lt;SPAN class="atv"&gt;"string-compare"&lt;/SPAN&gt; &lt;SPAN class="atn"&gt;condition&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;=&lt;/SPAN&gt;&lt;SPAN class="atv"&gt;"SecurityHeadersPolicy"&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;gt;&lt;/SPAN&gt;
  &lt;SPAN class="tag"&gt;&amp;lt;headers&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;header&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;name&amp;gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;X-Frame-Options&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="tag"&gt;&amp;lt;/name&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;value&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;SAMEORIGIN&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;lt;/value&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;/header&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;header&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;name&amp;gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;X-Content-Type-Options&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="tag"&gt;&amp;lt;/name&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;value&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;nosniff&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;lt;/value&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;/header&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;header&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;name&amp;gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;X-XSS-Protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="tag"&gt;&amp;lt;/name&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;value&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;1; mode=block&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;lt;/value&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;/header&amp;gt;&lt;/SPAN&gt;
  &lt;SPAN class="tag"&gt;&amp;lt;/headers&amp;gt;&lt;/SPAN&gt;
&lt;SPAN class="tag"&gt;&amp;lt;/config&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;FONT size="7"&gt;2.&lt;/FONT&gt; X-Frame-Options header&lt;P class="p"&gt;Adding this header to an HTTP response tells the browser whether&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Share&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;pages are permitted inside iframes. In our default configuration we have set this to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;SAMEORIGIN&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;which means that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Share&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;pages are only permitted inside iFrames inside&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Share&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or in other web applications that live under the same domain.&amp;nbsp;&lt;/P&gt;&lt;DIV class="p"&gt;You can override the configuration and set the header to return&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;DENY&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;instead, by placing the following configuration in your&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;share-config-custom.xml&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file:&lt;PRE&gt;&lt;SPAN class="tag"&gt;&amp;lt;config&lt;/SPAN&gt; &lt;SPAN class="atn"&gt;evaluator&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;=&lt;/SPAN&gt;&lt;SPAN class="atv"&gt;"string-compare"&lt;/SPAN&gt; &lt;SPAN class="atn"&gt;condition&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;=&lt;/SPAN&gt;&lt;SPAN class="atv"&gt;"SecurityHeadersPolicy"&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;gt;&lt;/SPAN&gt;
  &lt;SPAN class="tag"&gt;&amp;lt;headers&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;header&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;name&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;X-Frame-Options&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;lt;/name&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;value&amp;gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;DENY&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="tag"&gt;&amp;lt;/value&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;/header&amp;gt;&lt;/SPAN&gt;
  &lt;SPAN class="tag"&gt;&amp;lt;/headers&amp;gt;&lt;/SPAN&gt;
&lt;SPAN class="tag"&gt;&amp;lt;/config&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;DIV class="section"&gt;&amp;nbsp;&lt;P&gt;&lt;SPAN&gt;Could you please suggest here which one will be the perfect solution.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Currently we are planning to go with no.2.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;If any one is thinking about the no 1 please share the exact location of &lt;/SPAN&gt;&lt;STRONG&gt;alfresco-security-config.xml&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;have any one implemented the same earlier?&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 10 Jun 2020 12:53:03 GMT</pubDate>
    <dc:creator>Mohammadsherani</dc:creator>
    <dc:date>2020-06-10T12:53:03Z</dc:date>
    <item>
      <title>Security vulnerablity :- HTTP secuirty headers not detected</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/security-vulnerablity-http-secuirty-headers-not-detected/m-p/86781#M26209</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We are using ACS 5.2.6 with Windows OS.&lt;/P&gt;&lt;P&gt;We have recieved the security vulnerablity (http secuirty headers not detected. And for that we have two solution which are given below:-&lt;/P&gt;&lt;P&gt;&lt;FONT size="7"&gt;1.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Security filters and clickjacking mitigation&lt;/P&gt;&lt;DIV class="region region-content"&gt;&lt;DIV class="node node-documentation-page node-promoted clearfix"&gt;&lt;DIV class="content"&gt;&lt;DIV class="field field-name-body field-type-text-with-summary field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;DIV class="body conbody"&gt;&lt;DIV class="abstract"&gt;&lt;SPAN class="shortdesc"&gt;You can configure a security filter,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;SecurityHeadersPolicy, that mitigates clickjacking attacks in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Alfresco Share&lt;/SPAN&gt;.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P class="p"&gt;SecurityHeadersPolicy&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a Java Servlet filter that applies HTTP response headers to incoming requests in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Share&lt;/SPAN&gt;. The headers that are returned are defined in a configuration section called&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;SecurityHeadersPolicy&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;alfresco-security-config.xml.&lt;/P&gt;&lt;DIV class="p"&gt;Three headers are added by default;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;X-Frame-Options,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;X-Content-Type-Options&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;X-XSS-Protection:&lt;PRE&gt;&lt;SPAN class="tag"&gt;&amp;lt;config&lt;/SPAN&gt; &lt;SPAN class="atn"&gt;evaluator&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;=&lt;/SPAN&gt;&lt;SPAN class="atv"&gt;"string-compare"&lt;/SPAN&gt; &lt;SPAN class="atn"&gt;condition&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;=&lt;/SPAN&gt;&lt;SPAN class="atv"&gt;"SecurityHeadersPolicy"&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;gt;&lt;/SPAN&gt;
  &lt;SPAN class="tag"&gt;&amp;lt;headers&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;header&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;name&amp;gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;X-Frame-Options&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="tag"&gt;&amp;lt;/name&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;value&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;SAMEORIGIN&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;lt;/value&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;/header&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;header&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;name&amp;gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;X-Content-Type-Options&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="tag"&gt;&amp;lt;/name&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;value&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;nosniff&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;lt;/value&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;/header&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;header&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;name&amp;gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;X-XSS-Protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="tag"&gt;&amp;lt;/name&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;value&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;1; mode=block&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;lt;/value&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;/header&amp;gt;&lt;/SPAN&gt;
  &lt;SPAN class="tag"&gt;&amp;lt;/headers&amp;gt;&lt;/SPAN&gt;
&lt;SPAN class="tag"&gt;&amp;lt;/config&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;FONT size="7"&gt;2.&lt;/FONT&gt; X-Frame-Options header&lt;P class="p"&gt;Adding this header to an HTTP response tells the browser whether&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Share&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;pages are permitted inside iframes. In our default configuration we have set this to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;SAMEORIGIN&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;which means that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Share&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;pages are only permitted inside iFrames inside&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Share&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or in other web applications that live under the same domain.&amp;nbsp;&lt;/P&gt;&lt;DIV class="p"&gt;You can override the configuration and set the header to return&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;DENY&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;instead, by placing the following configuration in your&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;share-config-custom.xml&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file:&lt;PRE&gt;&lt;SPAN class="tag"&gt;&amp;lt;config&lt;/SPAN&gt; &lt;SPAN class="atn"&gt;evaluator&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;=&lt;/SPAN&gt;&lt;SPAN class="atv"&gt;"string-compare"&lt;/SPAN&gt; &lt;SPAN class="atn"&gt;condition&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;=&lt;/SPAN&gt;&lt;SPAN class="atv"&gt;"SecurityHeadersPolicy"&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;gt;&lt;/SPAN&gt;
  &lt;SPAN class="tag"&gt;&amp;lt;headers&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;header&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;name&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;X-Frame-Options&lt;/SPAN&gt;&lt;SPAN class="tag"&gt;&amp;lt;/name&amp;gt;&lt;/SPAN&gt;
      &lt;SPAN class="tag"&gt;&amp;lt;value&amp;gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;DENY&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="tag"&gt;&amp;lt;/value&amp;gt;&lt;/SPAN&gt;
    &lt;SPAN class="tag"&gt;&amp;lt;/header&amp;gt;&lt;/SPAN&gt;
  &lt;SPAN class="tag"&gt;&amp;lt;/headers&amp;gt;&lt;/SPAN&gt;
&lt;SPAN class="tag"&gt;&amp;lt;/config&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;DIV class="section"&gt;&amp;nbsp;&lt;P&gt;&lt;SPAN&gt;Could you please suggest here which one will be the perfect solution.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Currently we are planning to go with no.2.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;If any one is thinking about the no 1 please share the exact location of &lt;/SPAN&gt;&lt;STRONG&gt;alfresco-security-config.xml&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;have any one implemented the same earlier?&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 10 Jun 2020 12:53:03 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/security-vulnerablity-http-secuirty-headers-not-detected/m-p/86781#M26209</guid>
      <dc:creator>Mohammadsherani</dc:creator>
      <dc:date>2020-06-10T12:53:03Z</dc:date>
    </item>
  </channel>
</rss>

