Skip to content

Commit 9d6eb2d

Browse files
authored
Merge pull request #16179 from J0WI/mv-frameoptions
Add X-Frame-Options header to .htaccess
2 parents dc80aed + 1b074f4 commit 9d6eb2d

File tree

2 files changed

+14
-13
lines changed

2 files changed

+14
-13
lines changed

.htaccess

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,13 @@
1111

1212
<IfModule mod_env.c>
1313
# Add security and privacy related headers
14-
Header set X-Content-Type-Options "nosniff"
15-
Header set X-XSS-Protection "1; mode=block"
16-
Header set X-Robots-Tag "none"
17-
Header set X-Download-Options "noopen"
18-
Header set X-Permitted-Cross-Domain-Policies "none"
19-
Header set Referrer-Policy "no-referrer"
14+
Header always set Referrer-Policy "no-referrer"
15+
Header always set X-Content-Type-Options "nosniff"
16+
Header always set X-Download-Options "noopen"
17+
Header always set X-Frame-Options "SAMEORIGIN"
18+
Header always set X-Permitted-Cross-Domain-Policies "none"
19+
Header always set X-Robots-Tag "none"
20+
Header always set X-XSS-Protection "1; mode=block"
2021
SetEnv modHeadersAvailable true
2122
</IfModule>
2223

@@ -40,8 +41,8 @@
4041
</IfModule>
4142
<IfModule mod_rewrite.c>
4243
RewriteEngine on
43-
RewriteCond %{HTTP_USER_AGENT} DavClnt
44-
RewriteRule ^$ /remote.php/webdav/ [L,R=302]
44+
RewriteCond %{HTTP_USER_AGENT} DavClnt
45+
RewriteRule ^$ /remote.php/webdav/ [L,R=302]
4546
RewriteRule .* - [env=HTTP_AUTHORIZATION:%{HTTP:Authorization}]
4647
RewriteRule ^\.well-known/host-meta /public.php?service=host-meta [QSA,L]
4748
RewriteRule ^\.well-known/host-meta\.json /public.php?service=host-meta-json [QSA,L]

lib/private/legacy/response.php

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -89,22 +89,22 @@ public static function addSecurityHeaders() {
8989
. 'frame-src *; '
9090
. 'img-src * data: blob:; '
9191
. 'font-src \'self\' data:; '
92-
. 'media-src *; '
92+
. 'media-src *; '
9393
. 'connect-src *; '
9494
. 'object-src \'none\'; '
9595
. 'base-uri \'self\'; ';
9696
header('Content-Security-Policy:' . $policy);
97-
header('X-Frame-Options: SAMEORIGIN'); // Disallow iFraming from other domains
9897

9998
// Send fallback headers for installations that don't have the possibility to send
10099
// custom headers on the webserver side
101100
if(getenv('modHeadersAvailable') !== 'true') {
102-
header('X-XSS-Protection: 1; mode=block'); // Enforce browser based XSS filters
101+
header('Referrer-Policy: no-referrer'); // https://www.w3.org/TR/referrer-policy/
103102
header('X-Content-Type-Options: nosniff'); // Disable sniffing the content type for IE
104-
header('X-Robots-Tag: none'); // https://developers.google.com/webmasters/control-crawl-index/docs/robots_meta_tag
105103
header('X-Download-Options: noopen'); // https://msdn.microsoft.com/en-us/library/jj542450(v=vs.85).aspx
104+
header('X-Frame-Options: SAMEORIGIN'); // Disallow iFraming from other domains
106105
header('X-Permitted-Cross-Domain-Policies: none'); // https://www.adobe.com/devnet/adobe-media-server/articles/cross-domain-xml-for-streaming.html
107-
header('Referrer-Policy: no-referrer'); // https://www.w3.org/TR/referrer-policy/
106+
header('X-Robots-Tag: none'); // https://developers.google.com/webmasters/control-crawl-index/docs/robots_meta_tag
107+
header('X-XSS-Protection: 1; mode=block'); // Enforce browser based XSS filters
108108
}
109109
}
110110

0 commit comments

Comments
 (0)