We have developed a new application, and before moving the changes we did a static scan of code using checkmarx. There is a medium level vulnerablity that is found in the code named Client Cross Frame Scripting Attack.
This is detacted at first line of the JSP page :
<!DOCTYPE html>
Can you please help me understand this attack and what should be done to eliminate this?
The Client Cross Site Scripting Attack query finds if the page protects itself against being embedded in an IFrame. It searches for conditions such as:
if (top != self)
if (top.location != location)
if (top.frames.length != 0)
and so on.
This specific file, I believe, has no such conditions, so it MOST LIKELY does not protect itself, and this is why the query has found and marked it. Since we are looking for a missing line here, the result just shows you the file, and cannot show you where the problem is.
Hope it helps,
Adar from Checkmarx.