User Interface (UI) redress vulnerability (clickjacking) detected.
- Rule ID: php_lang_ui_redress
- Languages: php
- Source: ui_redress.yml
Description
Using unsanitized user input to set X-Frame-Options or Content-Security-Policy HTTP headers puts your application at risk for UI redress attacks (clickjacking).
Remediations
✅ Prefer the most secure values when setting these headers
header("X-Frame-Options: DENY");
header("Content-Security-Policy: frame-ancestors 'none'");
Resources
Associated CWE
OWASP Top 10
Configuration
To skip this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --skip-rule=php_lang_ui_redress
To run only this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --only-rule=php_lang_ui_redress
Ready to take the next step? Learn more about Bearer Cloud.