Bug ID 840257: Portal Access: HTML iframe sandbox attribute is not supported

Last Modified: Jan 22, 2021

Bug Tracker

Affected Product:  See more info
BIG-IP APM(all modules)

Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.0.1.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 14.1.2.4, 14.1.2.5, 14.1.2.6, 14.1.2.7, 14.1.2.8, 14.1.3, 14.1.3.1, 15.0.0, 15.0.1, 15.0.1.1, 15.0.1.2, 15.0.1.3, 15.0.1.4, 15.1.0, 15.1.0.1, 15.1.0.2, 15.1.0.3, 15.1.0.4, 15.1.0.5, 15.1.1, 15.1.2, 15.1.2.1, 16.0.0, 16.0.0.1, 16.0.1

Opened: Oct 17, 2019
Severity: 4-Minor

Symptoms

Issues with content displayed in iframes.

Impact

The web application does not work as expected.

Conditions

Using an iframe with the sandbox attribute in a web application.

Workaround

Use an iRule as a workaround. Although the exact content of the iRule is strongly dependent on the web application, you can use the following iRule as a good example that can be customized: when REWRITE_REQUEST_DONE { if { HTTP::path] ends_with "/CUSOM_PATH_TO_JS_FILE" } { REWRITE::post_process 1 } } when REWRITE_RESPONSE_DONE { while {true} { set str { sandbox="} set strt [string first $str [REWRITE::payload]] set str_len [string length $str] if { $strt > 0 and $strt < [expr [REWRITE::payload length] - $str_len] } { REWRITE::payload replace $strt $str_len { sandbo1="} } else { break } } }

Fix Information

None

Behavior Change