You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to OWASP ZAP User Group
Hi All,
I see that X-Frame-Options alert is valid only for old browsers like IE and is not supported in Chrome and Firefox. If I use Content-Security-Policy with valid urls is it enough? and I just set the X-Frame-Options alert as a false positive?
Thanks.
Ronen
kingthorin+owaspzap
unread,
Mar 2, 2021, 6:55:18 AM3/2/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to OWASP ZAP User Group
The X-Frame-Options scan rule does check if the CSP contains the frame-ancestors directive. So if it's popping then you still have an issue.
I'm not sure what makes you think it's only valid for old browsers, all modern browsers have supported XFO for a long time.