<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Clickjacking vulnerability in App Development</title>
    <link>https://community.qlik.com/t5/App-Development/Clickjacking-vulnerability/m-p/1659551#M63577</link>
    <description>&lt;P&gt;Hi Expert&lt;/P&gt;&lt;P&gt;Security team of my company, said me that the qliksense server has a CLICKJACKING VULNERABILITY, and send me the attached report like the image show.&lt;/P&gt;&lt;P&gt;After research, i&amp;nbsp; see this support post&amp;nbsp;&lt;A href="https://support.qlik.com/articles/000066253" target="_blank"&gt;https://support.qlik.com/articles/000066253&lt;/A&gt;&amp;nbsp;and modify the VIRTUAL PROXY like it said.&lt;/P&gt;&lt;P&gt;in&lt;STRONG&gt; advance option&lt;/STRONG&gt; in&lt;STRONG&gt; Virtual prox&lt;/STRONG&gt;y set this :&lt;STRONG&gt;&amp;nbsp;X-Frame-Options: DENY&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;After that, restart the services, restart the server, and the vulnerability is still there.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;is there any more to do to take out this vulnerability? Somebodoy have any recommendation?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks a Lot&lt;/P&gt;&lt;P&gt;Fernando&lt;/P&gt;</description>
    <pubDate>Sat, 16 Nov 2024 19:25:07 GMT</pubDate>
    <dc:creator>fkeuroglian</dc:creator>
    <dc:date>2024-11-16T19:25:07Z</dc:date>
    <item>
      <title>Clickjacking vulnerability</title>
      <link>https://community.qlik.com/t5/App-Development/Clickjacking-vulnerability/m-p/1659551#M63577</link>
      <description>&lt;P&gt;Hi Expert&lt;/P&gt;&lt;P&gt;Security team of my company, said me that the qliksense server has a CLICKJACKING VULNERABILITY, and send me the attached report like the image show.&lt;/P&gt;&lt;P&gt;After research, i&amp;nbsp; see this support post&amp;nbsp;&lt;A href="https://support.qlik.com/articles/000066253" target="_blank"&gt;https://support.qlik.com/articles/000066253&lt;/A&gt;&amp;nbsp;and modify the VIRTUAL PROXY like it said.&lt;/P&gt;&lt;P&gt;in&lt;STRONG&gt; advance option&lt;/STRONG&gt; in&lt;STRONG&gt; Virtual prox&lt;/STRONG&gt;y set this :&lt;STRONG&gt;&amp;nbsp;X-Frame-Options: DENY&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;After that, restart the services, restart the server, and the vulnerability is still there.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;is there any more to do to take out this vulnerability? Somebodoy have any recommendation?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks a Lot&lt;/P&gt;&lt;P&gt;Fernando&lt;/P&gt;</description>
      <pubDate>Sat, 16 Nov 2024 19:25:07 GMT</pubDate>
      <guid>https://community.qlik.com/t5/App-Development/Clickjacking-vulnerability/m-p/1659551#M63577</guid>
      <dc:creator>fkeuroglian</dc:creator>
      <dc:date>2024-11-16T19:25:07Z</dc:date>
    </item>
  </channel>
</rss>

