How to avoid X-frame-options while embedding html file? - html

I am using i-frame to import html file from another domain, however I get this error saying Refused to display 'url' in a frame because it set 'X-Frame-Options' to 'sameorigin'. Can you please help me to avoid the exception?

X-Frame-Options is a HTTP Header that prevents a URL from being viewed from within an IFrame. The only way to fix this is to change the X-Frame-Options header from the server that is serving the page you want to display within an IFrame.
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options

The setting has to be done at the web-server level (apache, IIS, etc). This link will give you details on this - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options

Related

Refused to display in a frame because it set 'X-Frame-Options' to 'sameorigin'

The content of the iframe element I use in my project is saying refused to connect." The Error i am getting is "refused to display 'https://clideo.com/' in a frame because it set 'X-Frame-Options' to 'sameorigin'".I am using React.js with python flask as backend. how can I fix this error?
I have tried using X-Frame-Bypass web component but it still didn't work.
<iframe src="https://clideo.com/editor/" width="100%" height="100%" title="Edit Video"/>
This error cannot be fixed, the X-Frame-Options header is set by the server you are connecting to (e.g., https://clideo.com/editor/) - that server has stated they do not want anyone (other than then) rendering their site in an iframe.
All browsers will respect this header, as it's commonly used for click hijacking (e.g., you render a site in an iframe and put a layer on top of it to intercept clicks/keystrokes).

X-Frame-Options is not set, yet Chrome complains that it is

I'm trying to load an IFrame on my website, but I'm getting the dreaded Refused to display 'url' in a frame because it set 'X-Frame-Options' to 'sameorigin'. However, when I look at the actual reponse headers sent from the other website I can't find a single occurance of X-Frame-Options!
Why does Chrome complain that the header is set when I can't find it in DevTools?
The URL of the site I'm trying to embedd is a https://localhost:44359 and it is running an ASP.NET Core MVC instance.
I tried adding some middleware to it to remove this header, but seeing as the header is never set there is also nothing to remove... unless, of course, this is set by MVC itself, in which case no middleware will help because MVC terminates the middleware pipeline.
I guess I could set a <meta> tag on the page itself, but even Google says that X-Frame-Options Allow-From is not supported and I found an article (unfortunaly can't find it again) that said Google would be using Content Security Policy for this instead. I tried adding frame-src https://localhost:44359 to the CSP for the site that is trying to embed an iframe, but that had no effect.
Is there any way of "forcing" Chrome (et al) to accept an iframe from localhost?

iframe showing up blank

I am trying to use a simple iframe on my website. But it is not showing up. Please see the screenshot. This is my code:
<iframe src="https://www.w3schools.com"></iframe>
What am I doing wrong? Thanks
Your code is right, it's w3schools.com that's the problem. Opening up the developer console reveals this:
Refused to display 'https://www.w3schools.com/' in a frame because it set 'X-Frame-Options' to 'sameorigin'.
This means that w3schools.com will only work in a frame when the "origin" (the website your frame is on) is from w3schools.com. Otherwise, you'll just get a blank frame.
Pages from W3Schools are not displayed in iframe elements from different server because the W3Schools site implements an iframe blocking policy. In order to do this, it uses the X-Frame-Options. (See also how to block website from loading in iframe?.)
You can check whether a site implements this policy by inspecting its HTTP headers. For example, in Firefox, press F12 to open the inspection tools, then go to Network, select one of the objects that were sent over HTTP and look at the headers (or filter the headers for e.g. "x-frame"). Below is what this looks like for W3Schools:
Notice x-frame-options: SAMEORIGIN in the lower right part of the screenshot. With x-frame-options: SAMEORIGIN (or on some other sites x-frame-options: DENY) set on the server side, you will not be able to load pages from that site inside an iframe or a frame.
For more background, see X-Frame-Options – How to Combat Clickjacking, which also explains other values that can be used in the x-frame-options header.
If you want to test with a webpage from a server that does not block loading in iframes, try for example https://wiki.archlinux.org/.

how to display another site in an iframe in spite of X-Frame-Options

I have created a site that lists a series of links to external websites about a specific topic and then when the user clicks on such links the links open in an iframe.
It works locally but on my shared hosting server every link that is clicked opens in the full browser (as if target were set to "_top" instead of "myIFRAME").
I have tried adding an .htaccess file to my root with this:
Header always append X-Frame-Options ALLOWALL
and this:
add_header X-Frame-Options "ALLOWALL"
as well as this:
Header always append X-Frame-Options ALLOW-FROM http://www.example.com
In each of these cases I have verified with Google Chrome Dev Tools that the headers were being set and they were, but the pages keep openig in the main browser.
Is there anything else I can do?
Or my only solution to swap iframes for deprecated frames?
Thanks
Actually I was able to make it work.
I added a:
<base target="myTargetFrameID">
in the section of my main html file.
And I also added this:
Header always unset X-Frame-Options
to an .htaccess file in the folder of the script (which I read about here: http://osric.com/chris/accidental-developer/2016/02/per-directory-x-frame-options-header-apache/)
Works now.
Thanks
You can't, and there is no workaround. Framesets won't work either; X-Frame-Options applies to all types of frames, not just iframes.
The purpose of the X-Frame-Options header is to allow a web site to prevent itself from being displayed in a frame. You cannot override it by setting headers on a page on your own domain; that would make the header useless.
If you want to link to these sites, you will need to link to them normally. You cannot display them in frames.

iframe refuses to display

I am trying to load a simple iframe into one of my web pages but it is not displaying. I am getting this error in Chrome:
Refused to display 'https://cw.na1.hgncloud.com/crossmatch/index.do' in a frame because an ancestor violates the following Content Security Policy directive: "frame-ancestors 'self' https://cw.na1.hgncloud.com".
Invalid 'X-Frame-Options' header encountered when loading 'https://cw.na1.hgncloud.com/crossmatch/index.do': 'ALLOW-FROM https://cw.na1.hgncloud.com' is not a recognized directive. The header will be ignored.
This is the code for my iframe:
<p><iframe src="https://cw.na1.hgncloud.com/crossmatch/" width="680" height="500" frameborder="0"></iframe></p>
I am not really sure what that means. I have loaded plenty iframes before and never received such errors.
Any ideas?
It means that the http server at cw.na1.hgncloud.com send some http headers to tell web browsers like Chrome to allow iframe loading of that page (https://cw.na1.hgncloud.com/crossmatch/) only from a page hosted on the same domain (cw.na1.hgncloud.com) :
Content-Security-Policy: frame-ancestors 'self' https://cw.na1.hgncloud.com
X-Frame-Options: ALLOW-FROM https://cw.na1.hgncloud.com
You should read that :
https://developer.mozilla.org/en-US/docs/Web/Security/CSP
https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy
The reason for the error is that the host server for https://cw.na1.hgncloud.com has provided some HTTP headers to protect the document. One of which is that the frame ancestors must be from the same domain as the original content. It seems you are attempting to put the iframe at a domain location that is not the same as the content of the iframe - thus violating the Content Security Policy that the host has set.
Check out this link on Content Security Policy for more details.
For any of you calling back to the same server for your IFRAME, pass this simple header inside the IFRAME page:
Content-Security-Policy: frame-ancestors 'self'
Or, add this to your web server's CSP configuration.
In my case it was that the site i was embedding had a specific url for embedding content and a different url for sharing
the url i had set in the iframe was
https://site/share/2432423232
changing it to
https://site/embed/2432423232
worked for me
The same issue appears to me, don't open the page in a private window.
You can use multiple browsers if you need to log in with different users.