app-attack-fixes/clickjacking-vulnerability #321
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Base Branch: app-attack-fixes
Note: Making a PR to thoth-tech/doubtfire-web so that this can be merged asap, and HardHat leads can retest this fix.
Description
This PR ensures that the internal
nginx.confinsidedoubtfire-webdoes not override the security headers (e.g.,X-Frame-Options,Content-Security-Policy) that are now being enforced via the outerproxy-nginx.conffile in thedoubtfire-deployrepository.Note
Kindly go through the attached documentation first inorder to understand what this fix is about in detail and how it can be tested.
What was changed:
doubtfire-web/nginx.confto prevent conflict or override with headers applied at the reverse proxy layer (proxy-nginx.conf).Fixes # (Header override issues caused by multiple NGINX layers)
Type of change
How Has This Been Tested?
proxy-nginx.conf(doubtfire-deploy) reflect in browser responsedoubtfire-web/nginx.confTesting Checklist:
Checklist: