Dear Forum,
I recently ran  metasploit
<https://en.wikipedia.org/wiki/Metasploit_Project>   on my wicket 6
appilcation and one of the vulnerabilities found was " clickjacking
<https://www.owasp.org/index.php/Clickjacking>  "

A quick search on google suggested a couple of solution for Java EE
applications: one from  OWASP
<https://www.owasp.org/index.php/ClickjackFilter_for_Java_EE>   and one for 
Java Evangelist blog
<http://javaevangelist.blogspot.co.uk/2014/06/clickjacking-and-java-ee-some-practical.html>
 
.   
The solutions in those posts, suggest the use of filters. 

I just would like to know if any of you were aware of this issue and how you
went implementing a solution for your wicket application, either just adding
code to the page header or creating filters or any other means.

Thanks in advance,
Lucas


--
View this message in context: 
http://apache-wicket.1842946.n4.nabble.com/wicket-framework-and-clickjacking-risk-tp4668840.html
Sent from the Users forum mailing list archive at Nabble.com.

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@wicket.apache.org
For additional commands, e-mail: users-h...@wicket.apache.org

Reply via email to