Nexus' software components have new names:

Nexus PRIME -> Smart ID Identity Manager
Nexus Certificate Manager -> Smart ID Certificate Manager
Nexus Hybrid Access Gateway -> Smart ID Digital Access component
Nexus Personal -> Smart ID clients

Go to Nexus homepage for overviews of Nexus' solutions, customer cases, news and more.


Skip to end of metadata
Go to start of metadata

Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is "hijacking" clicks, meant for their page and routing them to another page, most likely owned by another application, domain, or both.

Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of style sheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.

A future version of Digital Access component will by default implement a protection against this vulnerability. Meanwhile you can follow the instructions to apply the wascr script published with this article, to protect Digital Access component against the clickjacking vulnerability.

Expand/Collapse All

Prerequisites

Step-by-step instruction

 Log in to Digital Access Admin
  1. Log in to Digital Access Admin with an administration account.
 Upload script file
  1. In Digital Access Admin, click Browse.
  2. Upload the provided script file add_header.wascr (without changing the file name) to access-point/custom-files/scripts.

 Add filter
  1. In Digital Access Admin, go to Manage Resource Access.
  2. Click Global Resource Settings.
  3. In the Filters tab, click Add Filter...
  4. In Display Name, enter Add X-Frame-Options header. (This name describes the purpose with the filter)
  5. In Script Name, enter add_header.

    The script name must match exactly the name of the script file but without the file suffix .wascr

  6. In Type of Filter, select Response.
  7. In Resource Host, select All resource hosts.
  8. In Path, enter *.
  9. In Apply Filter To, select Headers.
  10. Define variable header_name:
    1. Click Add Variable...
    2. In Name, enter header_name
    3. In Value, enter X-Frame-Options
    4. Click Add.
  11. Define variable header_value:
    1. Click Add Variable...
    2. In Name, enter header_value
    3. In Value, enter DENY
    4. Click Add.
  12. Click Add.
  13. Click Save.
  14. Click Publish to apply the settings.

Related information