24.04.2013 Views

BMC Remedy Action Request System 7.6.04 Web Application ...

BMC Remedy Action Request System 7.6.04 Web Application ...

BMC Remedy Action Request System 7.6.04 Web Application ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

White paper<br />

<strong>BMC</strong> <strong>Remedy</strong> <strong>Action</strong> <strong>Request</strong> <strong>System</strong> <strong>7.6.04</strong><br />

<strong>Web</strong> <strong>Application</strong> Security<br />

Assessment and Vulnerability<br />

Mitigation Tests<br />

January 2011<br />

www.bmc.com


Contacting <strong>BMC</strong> Software<br />

You can access the <strong>BMC</strong> Software website at http://www.bmc.com. From this website, you can obtain information about the<br />

company, its products, corporate offices, special events, and career opportunities.<br />

United States and Canada<br />

Address <strong>BMC</strong> SOFTWARE INC<br />

2101 CITYWEST BLVD<br />

HOUSTON TX 77042-2827 USA<br />

Telephone 713 918 8800<br />

or 800 841 2031<br />

Outside United States and Canada<br />

Telephone (01) 713 918 8800 Fax (01) 713 918 8000<br />

Fax 713 918 8000<br />

If you have comments or suggestions about this documentation, contact Information Development by email at<br />

doc_feedback@bmc.com.<br />

© Copyright 2010 <strong>BMC</strong> Software, Inc.<br />

<strong>BMC</strong>, <strong>BMC</strong> Software, and the <strong>BMC</strong> Software logo are the exclusive properties of <strong>BMC</strong> Software, Inc., are registered<br />

with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other<br />

<strong>BMC</strong> trademarks, service marks, and logos may be registered or pending registration in the U.S. or in other countries.<br />

All other trademarks or registered trademarks are the property of their respective owners.<br />

AppScan, IBM, and Rational are trademarks or registered trademarks of International Business Machines Corporation<br />

in the United States, other countries, or both.<br />

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their<br />

respective owners.<br />

<strong>BMC</strong> Software considers information included in this documentation to be proprietary and confidential. Your use of<br />

this information is subject to the terms and conditions of the applicable End User License Agreement for the product<br />

and the proprietary and restricted rights notices included in this documentation.<br />

Restricted Rights Legend<br />

U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVED UNDER THE<br />

COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any data and computer software<br />

by the U.S. Government is subject to restrictions, as applicable, set forth in FAR Section 52.227-14, DFARS 252.227-<br />

7013, DFARS 252.227-7014, DFARS 252.227-7015, and DFARS 252.227-7025, as amended from time to time.<br />

Contractor/Manufacturer is <strong>BMC</strong> Software, Inc., 2101 CityWest Blvd., Houston, TX 77042-2827, USA. Any contract<br />

notices should be sent to this address.


Customer Support<br />

You can obtain technical support by using the Support page on the <strong>BMC</strong> Software website or by contacting Customer Support by<br />

telephone or email. To expedite your inquiry, please see “Before Contacting <strong>BMC</strong> Software.”<br />

Support website<br />

You can obtain technical support from <strong>BMC</strong> Software 24 hours a day, 7 days a week at http://www.bmc.com/support_home. From<br />

this website, you can:<br />

• Read overviews about support services and programs that <strong>BMC</strong> Software offers.<br />

• Find the most current information about <strong>BMC</strong> Software products.<br />

• Search a database for problems similar to yours and possible solutions.<br />

• Order or download product documentation.<br />

• Report a problem or ask a question.<br />

• Subscribe to receive email notices when new product versions are released.<br />

• Find worldwide <strong>BMC</strong> Software support center locations and contact information, including email addresses, fax numbers,<br />

and telephone numbers.<br />

Support by telephone or email<br />

In the United States and Canada, if you need technical support and do not have access to the <strong>Web</strong>, call 800 537 1813 or send an<br />

email message to customer_support@bmc.com. (In the Subject line, enter SupID:, such as SupID:12345.)<br />

Outside the United States and Canada, contact your local support center for assistance.<br />

Before contacting <strong>BMC</strong> Software<br />

Have the following information available so that Customer Support can begin working on your issue immediately:<br />

• Product information<br />

o Product name<br />

o Product version (release number)<br />

o License number and password (trial or permanent)<br />

• Operating system and environment information<br />

o Machine type<br />

o Operating system type, version, and service pack<br />

o <strong>System</strong> hardware configuration<br />

o Serial numbers<br />

o Related software (database, application, and communication) including type, version, and service pack or<br />

maintenance level<br />

• Sequence of events leading to the problem<br />

• Commands and options that you used<br />

• Messages received (and the time and date that you received them)<br />

o Product error messages<br />

o Messages from the operating system, such as file system full<br />

o Messages from related software


License key and password information<br />

If you have a question about your license key or password, contact Customer Support through one of the following methods:<br />

• E-mail customer_support@bmc.com. (In the Subject line, enter SupID:, such as<br />

SupID:12345.)<br />

• In the United States and Canada, call 800 537 1813. Outside the United States and Canada, contact your local support<br />

center for assistance.<br />

• Submit a new issue at http://www.bmc.com/support_home


Contents<br />

<strong>System</strong> architecture ......................................................................... 7<br />

AppScan test results ........................................................................ 8<br />

OWASP Top Ten: AR <strong>System</strong> protections .................................... 11<br />

General guidelines ......................................................................... 14<br />

Encryption ............................................................................................. 14<br />

Secure Socket Layer ............................................................................. 14<br />

Secure Tomcat installation .................................................................... 14<br />

Session management ............................................................................ 15<br />

HTTP TRACE disabled .......................................................................... 15<br />

XSS filter enhanced ............................................................................... 16<br />

Data Visualization module plugins ......................................................... 16<br />

Mid tier Return Back parameter ............................................................. 16<br />

Mid tier and portlet containers ............................................................... 16


White paper<br />

<strong>Web</strong> <strong>Application</strong> Security Assessment and<br />

Vulnerability Mitigation Tests<br />

This paper highlights the IBM Rational® AppScan® automated assessment<br />

process for web application security that <strong>BMC</strong> implements for the <strong>BMC</strong> <strong>Remedy</strong><br />

<strong>Action</strong> <strong>Request</strong> (AR) <strong>System</strong>. It also provides a list of security protections that<br />

<strong>BMC</strong> provides to mitigate against vulnerabilities outlined in the Open <strong>Web</strong><br />

<strong>Application</strong> Security Project (OWASP) Top Ten list.<br />

Note: The IT environment and network infrastructure in which your AR<br />

<strong>System</strong> runs must be properly secured and include standard IT<br />

network security tools and systems such as firewalls and intrusion<br />

detection systems (IDS).<br />

The following AR <strong>System</strong> security-related information is available on the<br />

Customer Support website at http://www.bmc.com/support:<br />

• <strong>BMC</strong> <strong>Remedy</strong> AR <strong>System</strong> 7.6.03 Encryption Security Guide<br />

• <strong>BMC</strong> <strong>Remedy</strong> AR <strong>System</strong> 7.5.00 Installation Guide - Mid-tier post-installation<br />

procedures section<br />

• <strong>BMC</strong> <strong>Remedy</strong> AR <strong>System</strong> 7.5.00 Configuring You <strong>Web</strong> Server and Installing<br />

<strong>BMC</strong> <strong>Remedy</strong> Mid Tier with a .war File white paper<br />

<strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests 6


<strong>System</strong> architecture<br />

Presentation layer<br />

<strong>System</strong> architecture<br />

The AR <strong>System</strong> architecture is multi-tiered; it consists of a Presentation layer, a<br />

Logic layer, and a Data layer as shown in Figure 1.<br />

Figure 1. AR <strong>System</strong> security architecture diagram<br />

The Presentation layer consists of the web browser client connected to the mid tier<br />

with secure socket layer (SSL) encryption. You must implement SSL to secure the<br />

connection between the browser and the web server. <strong>BMC</strong> supports any SSL<br />

version that is supported by the HTTP web services vendors listed in the <strong>BMC</strong><br />

<strong>Remedy</strong> AR <strong>System</strong> Compatibility Matrix, which is available on the Support<br />

website.<br />

<strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests 7


White Paper<br />

Logic layer<br />

Data layer<br />

The Logic layer includes instances of a mid tier, a JavaServer Pages (JSP) engine,<br />

a web server, and the AR <strong>System</strong> server. The JSP engine and accompanying<br />

servlets provide dynamically generated HTML and XML documents in response<br />

to web client requests. The mid tier installer includes and can automatically install<br />

a bundled version of the Tomcat web server.<br />

The mid tier translates client requires, interprets responses from the AR <strong>System</strong><br />

server, handles web service requests, and runs server-side processes that present<br />

AR <strong>System</strong> functionality to the client from the AR <strong>System</strong> server. The server<br />

executes workflow and business logic that define all AR <strong>System</strong> applications.<br />

Because all AR <strong>System</strong> clients are API-based, turning on encryption ensures that<br />

all interactions with the server are encrypted.<br />

The Data layer consists of one or more databases, which perform data storage and<br />

retrieval functions. The AR <strong>System</strong> server connects to the Data layer using<br />

database client API libraries. The server can work with the database encryption<br />

libraries used to protect data that is transmitted between the server and database.<br />

8 <strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests


AppScan test results<br />

AppScan test results<br />

<strong>BMC</strong> uses IBM Rational AppScan, a <strong>Web</strong> 2.0 security assessment tool, as an<br />

integrated part of the software development life cycle (SDLC). By performing a<br />

wide range of early detection testing, <strong>BMC</strong> identifies and fixes or mitigates<br />

vulnerabilities before they become security risks.<br />

AppScan provides issue severity levels and detailed descriptions as well as<br />

advisories and issue solution recommendations for potential security risks related<br />

to AR <strong>System</strong> components. <strong>BMC</strong> uses this data to investigate and proactively<br />

resolve security issues. Figure 2 shows a sample AppScan results page.<br />

Figure 2. Sample AppScan test result window<br />

<strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests 9


White Paper<br />

Table 1 lists the AppScan version 7.8 test results. No high-severity vulnerabilities<br />

were detected in the AR <strong>System</strong> mid tier version 7.5.00 patch 7.<br />

Table 1. AppScan test results<br />

AR <strong>System</strong> Servlet Test Result<br />

AdminServlet False vulnerabilities were detected. This AR <strong>System</strong><br />

servlet is implemented in the web service module.<br />

Users must provide a user name and password when<br />

the service is requested.<br />

<strong>Application</strong>Servlet No vulnerabilities were detected.<br />

AttachServlet False vulnerabilities were detected. An error page<br />

notifies users that a session is not valid.<br />

BackChannelServlet No vulnerabilities were detected.<br />

FBImageServlet False vulnerabilities were detected. The embedded<br />

script is not executed. It is reported as an error. In<br />

addition, an error is logged and appears in the status<br />

bar. Access is not allowed.<br />

Flashboard_params False vulnerabilities were detected. An error is<br />

logged and appears in the status bar. Access is not<br />

allowed.<br />

FormsServlet No vulnerabilities were detected.<br />

HomeServlet No vulnerabilities were detected.<br />

Imagepool No vulnerabilities were detected.<br />

ImageServlet No vulnerabilities were detected.<br />

LicenseReleaseServlet No vulnerabilities were detected.<br />

LoginServlet No vulnerabilities were detected.<br />

LogoutServlet No vulnerabilities were detected.<br />

Plugineventester False vulnerabilities were detected. The mid tier<br />

responds with an error page.<br />

ProtectedWSDLServlet No vulnerabilities were detected.<br />

ReportServlet No vulnerabilities were detected.<br />

10 <strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests


AR <strong>System</strong> Servlet Test Result<br />

OWASP Top Ten: AR <strong>System</strong> protections<br />

Report_params False vulnerabilities were detected. When URL<br />

parameters are sent, <strong>BMC</strong> advises users to deploy<br />

HTTP over SSL.<br />

ResourceServlet No vulnerabilities were detected.<br />

ViewFormServlet False vulnerabilities were detected. The embedded<br />

script is not executed. It is reported as an error.<br />

When URL parameters are sent, <strong>BMC</strong> advises users<br />

to deploy HTTP over SSL.<br />

OWASP Top Ten: AR <strong>System</strong> protections<br />

Using AppScan, <strong>BMC</strong> specifically tests for vulnerabilities identified in the Open<br />

<strong>Web</strong> <strong>Application</strong> Security Project (OWASP) Top Ten list. Security risks identified<br />

by OWASP and AR <strong>System</strong> protections are listed and described in Table 2.<br />

Table 2. AR <strong>System</strong> protections against the OWASP Top Ten<br />

Sample risk OWASP description AR <strong>System</strong> protections<br />

Injection Attackers trick a process into<br />

calling external processes of<br />

their choice by injecting<br />

control-plane data into the<br />

data plane. Command<br />

injection has two forms:<br />

• An attacker changes the<br />

command that the program<br />

executes, explicitly<br />

redefining the command.<br />

• An attacker changes the<br />

environment in which the<br />

command executes,<br />

implicitly redefining the<br />

command.<br />

To prevent command injection,<br />

AR <strong>System</strong> disables server-side<br />

scripting.<br />

To prevent JavaScript and SQL<br />

injection, AR <strong>System</strong>:<br />

• Encloses all dates in quotes and<br />

escapes all quotes.<br />

• Uses filters for escape<br />

characters.<br />

• Provides strong-types and usersupplied<br />

fields.<br />

• Checks for type constraints.<br />

To prevent blind SQL injection,<br />

AR <strong>System</strong> properly filters<br />

escape characters.<br />

• Secures variables with strong<br />

types and validation.<br />

• Sets security privileges on the<br />

database to least required.<br />

<strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests 11


White Paper<br />

Sample risk OWASP description AR <strong>System</strong> protections<br />

Cross-Site<br />

Scripting (XSS)<br />

Broken<br />

Authentication<br />

and Session<br />

Management<br />

Insecure Direct<br />

Object<br />

References<br />

Cross-Site<br />

<strong>Request</strong> Forgery<br />

(CSRF)<br />

Security<br />

Misconfiguration<br />

Attackers can make a single<br />

request to a vulnerable server<br />

that causes the server to create<br />

two responses. The second<br />

response might be<br />

misinterpreted as a response to<br />

a different request, possibly<br />

one made by another user<br />

sharing the same TCP<br />

connection with the server.<br />

Attackers can bypass<br />

authentication mechanisms if<br />

credentials do not accompany<br />

every request.<br />

Attackers force the return of<br />

sensitive information instead<br />

of non-sensitive information<br />

that would be returned<br />

normally.<br />

Using this technique, attackers<br />

make victims perform actions<br />

that they did not intend to,<br />

such as logging out,<br />

purchasing items, or other<br />

functions provided by the<br />

vulnerable website. The<br />

victim’s browser is tricked<br />

into issuing a command to a<br />

vulnerable web application.<br />

The vulnerability is caused by<br />

browsers automatically<br />

including user authentication<br />

data such as a session ID, IP<br />

address, or Microsoft<br />

Windows domain credentials<br />

with each request.<br />

This attack involves exploiting<br />

insecure configurations.<br />

12 <strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests<br />

All user-supplied HTML special<br />

characters are encoded into<br />

character entities, thereby<br />

preventing them from being<br />

interpreted as HTML.<br />

All requests contain credentials.<br />

The mid tier does not use<br />

cookies. It uses a cache ID in the<br />

URL and controls the user role<br />

(such as the Admin role.)<br />

AR <strong>System</strong> uses web server<br />

session management to store AR<br />

<strong>System</strong> authentication into the<br />

HTTPS session.<br />

All object references are subject<br />

to permissions enforced by the<br />

AR <strong>System</strong> server.<br />

The AR <strong>System</strong> disables web<br />

server scripting in the mid tier.<br />

In addition, logic that runs<br />

processes on the AR <strong>System</strong><br />

server is restricted by the AR<br />

<strong>System</strong> permissions model, and<br />

processes that may be run are<br />

restricted to specific directories<br />

on the server.<br />

AR <strong>System</strong> configuration<br />

guidelines ensure secure<br />

operation. For example, AR<br />

<strong>System</strong> restricts user access to<br />

directories required for user<br />

operations, and AR <strong>System</strong><br />

validates all user input.


OWASP Top Ten: AR <strong>System</strong> protections<br />

Sample risk OWASP description AR <strong>System</strong> protections<br />

Insecure<br />

Cryptographic<br />

Storage<br />

Failure to<br />

Restrict URL<br />

Access<br />

Insufficient<br />

Transport Layer<br />

Protection<br />

Unvalidated<br />

Redirects and<br />

Forwards<br />

The most common flaw in this<br />

area is simply not encrypting<br />

data that deserves encryption.<br />

When encryption is employed,<br />

unsafe key generation, nonrotating<br />

keys, and weak<br />

algorithm usage is common.<br />

The use of weak or unsalted<br />

hashes to protect passwords is<br />

also common. External<br />

attackers have difficulty<br />

detecting such flaws due to<br />

limited access.<br />

Attackers may access pages<br />

beyond the login page without<br />

authorization.<br />

Attackers may intercept<br />

unprotected network traffic if<br />

only SSL or TLS is used<br />

during authentication.<br />

<strong>Application</strong>s frequently<br />

redirect users to other pages,<br />

or use internal forwards in a<br />

similar manner. Sometimes<br />

the target page is specified in<br />

an unvalidated parameter,<br />

allowing attackers to choose<br />

the destination page.<br />

All sensitive data is encrypted<br />

within AR <strong>System</strong>.<br />

All communication between the<br />

web browser and the web server<br />

can be encrypted using HTTPS.<br />

All communication between the<br />

web server and the AR <strong>System</strong><br />

server can be encrypted using<br />

API encryption.<br />

All access to all AR <strong>System</strong><br />

pages require authorization from<br />

the AR <strong>System</strong> server.<br />

AR <strong>System</strong> uses transport layer<br />

security and digital signatures to<br />

perform end-to-end validation<br />

after a connection is made to an<br />

endpoint.<br />

FIPS-compliant Performance<br />

and Premium Encryption add-on<br />

components are provided for<br />

additional cryptographic<br />

protection among AR <strong>System</strong><br />

components.<br />

All AR <strong>System</strong> parameters are<br />

validated and authenticated<br />

against user credentials.<br />

<strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests 13


White Paper<br />

General guidelines<br />

Encryption<br />

Secure Socket Layer<br />

This section describes general security guidelines to consider when using AR<br />

system.<br />

AR <strong>System</strong> provides <strong>BMC</strong> <strong>Remedy</strong> Encryption Performance Security and <strong>BMC</strong><br />

<strong>Remedy</strong> Encryption Premium Security components that you can install to provide<br />

well-protected communication among AR <strong>System</strong> components.<br />

• Performance Security includes a Federal Information Processing Standard<br />

(FIPS) encryption option. When this option is enabled, network traffic is<br />

encrypted using AES CBC with a 128-bit key for data encryption and a<br />

1024-bit modulus for the RSA key exchange. It uses SHA-1 for message<br />

authentication. This option supports the minimum FIPS 140-2 encryption<br />

requirements.<br />

• Premium Security includes a premium FIPS encryption option. When this<br />

option is enabled, network traffic is encrypted using AES CBC with a 256bit<br />

key for data encryption and a 2048-bit modulus for the RSA key<br />

exchange. It uses SHA-1 for message authentication. This option supports<br />

premium FIPS 140-2 encryption requirements.<br />

You should use secure socket layer (SSL) to encrypt the traffic between the HTTP<br />

web server and the browser client. Configuring the environment for SSL support<br />

is beyond the scope of any guidance that <strong>BMC</strong> provides. Note that enabling SSL<br />

can impact performance due to the extra overhead required to encrypt and decrypt<br />

traffic.<br />

Secure Tomcat installation<br />

Because the Tomcat JSP engine is bundled with the mid tier, the AR <strong>System</strong><br />

installation script performs the following clean-up tasks to ensure that security<br />

issues in Tomcat are resolved:<br />

• Removes the contents of the root directory from the<br />

Tomcat_installation_directory/webapps directory.<br />

• Adds an index.html file to the root directory. This file appears if the<br />

administrator enters http://localhost:8080 in a browser and Tomcat is running<br />

properly.<br />

• Removes the tomcat-docs directory from the<br />

Tomcat_installation_directory/webapps directory.<br />

14 <strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests


Session management<br />

HTTP TRACE disabled<br />

General guidelines<br />

• Removes the host-manager and manager web default web applications from<br />

the Tomcat_installation_directory/webapps/server/webapps directory.<br />

• Removes the deployment descriptors for the host-manager and manager<br />

applications from the Tomcat_installation_directory/conf/Catalina/localhost.<br />

directory. The descriptors are the host-manager.xml and<br />

manager.xml.<br />

• Removes all unused ports from service (in particular, port 8080). It strips the<br />

default server.xml configuration file in the Tomcat installation directory<br />

so that the installation supports the mid tier only.<br />

These tasks make the Tomcat installation more secure; however, it can be difficult<br />

to determine if the mid tier or if the Tomcat engine failed to install properly<br />

because all extraneous services are removed. To ease this problem, an index.html<br />

page that displays when Tomcat is running is also installed.<br />

If the mid tier fails to run after installation, complete the following steps to<br />

determine whether the problem is the Tomcat installation or the mid tier<br />

installation:<br />

1. Stop Tomcat.<br />

2. Open the Tomcat_installation_directory/conf/server.xml file and uncomment<br />

the Connector entry at port 8080.<br />

3. Restart Tomcat.<br />

4. In a browser on the same computer as the Tomcat installation, go to<br />

http://localhost:8080.<br />

If the Tomcat engine is running properly, the message: Tomcat is running displays<br />

in the browser.<br />

If a session between the web browser and the mid tier is idle for 90 minutes or if<br />

the user closes a browser, the AR <strong>System</strong> license is released. You can configure<br />

idle time parameters in the Mid Tier Configuration tool.<br />

HTTP TRACE is a default function in many web servers, primarily used for<br />

debugging. The client sends an HTTP TRACE request with all header information<br />

including cookies, and the server simply responds with that same data.<br />

To prevent cross-site tracing (XST) attacks that use XSS and the HTTP TRACE<br />

function, the HTTP TRACE function in the mid tier is disabled by default. To<br />

disable the HTTP TRACE function completely, you must also disable HTTP<br />

TRACE on the application server hosting the mid tier.<br />

For information about how to enable the TRACE function, see “HTTP tracing in<br />

the mid tier” in the <strong>BMC</strong> <strong>Remedy</strong> Mid Tier Guide.<br />

<strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests 15


White Paper<br />

XSS filter enhanced<br />

By default, the mid tier contains an XSS filter that is frequently updated with<br />

additional characters.<br />

Data Visualization module plugins<br />

By default, security is disabled for data passed through the mid tier using the data<br />

visualization model plugins. To enable mid tier security for the plugins, you must<br />

add the following option to the config.properties file:<br />

arsystem.plugin_securitycheck=true<br />

Mid tier Return Back parameter<br />

The default value of the Return Back parameter is false. You must change the<br />

value to true to prevent the mid tier from allowing a user to submit a URL<br />

containing a Return Back parameter. To change the value, add the following<br />

setting to the config.properties file and restart the mid tier:<br />

arsystem.allow.returnback.url=true<br />

If the default value is not changed, arsystem.allow.returnback.url<br />

could allow users to alter a base return URL when the URL is sent back to the<br />

browser from the web server. This behavior could make the system vulnerable to a<br />

phishing attack.<br />

Mid tier and portlet containers<br />

To prevent frame phishing vulnerabilities in the mid tier, the mid tier verifies that<br />

it is not placed inside a portlet container and/or displayed in third-party frames or<br />

iFrames. If a portlet container, third-party frame, or iFrame is detected, the mid<br />

tier automatically disconnects from the object and displays the content in a single<br />

window.<br />

16 <strong>Web</strong> <strong>Application</strong> Security Assessment and Vulnerability Mitigation Tests


178629<br />

*187116*

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!