Message ID | ad598ba1ce644a29c997139c82d790a3ac65f4b4.1680708757.git.mirai@makinata.eu |
---|---|
State | New |
Headers |
Return-Path: <guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org> X-Original-To: patchwork@mira.cbaines.net Delivered-To: patchwork@mira.cbaines.net Received: by mira.cbaines.net (Postfix, from userid 113) id 6F0D617366; Wed, 5 Apr 2023 16:35:28 +0100 (BST) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mira.cbaines.net X-Spam-Level: X-Spam-Status: No, score=-2.0 required=5.0 tests=MAILING_LIST_MULTI, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mira.cbaines.net (Postfix) with ESMTPS id EC31B1735B for <patchwork@mira.cbaines.net>; Wed, 5 Apr 2023 16:35:26 +0100 (BST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from <guix-patches-bounces@gnu.org>) id 1pk5A9-00049n-1L; Wed, 05 Apr 2023 11:35:05 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <Debian-debbugs@debbugs.gnu.org>) id 1pk5A7-00049e-Az for guix-patches@gnu.org; Wed, 05 Apr 2023 11:35:03 -0400 Received: from debbugs.gnu.org ([209.51.188.43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from <Debian-debbugs@debbugs.gnu.org>) id 1pk5A7-0007m3-2I for guix-patches@gnu.org; Wed, 05 Apr 2023 11:35:03 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from <Debian-debbugs@debbugs.gnu.org>) id 1pk5A6-0007JL-Cv for guix-patches@gnu.org; Wed, 05 Apr 2023 11:35:02 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#62678] [PATCH] services: nginx: Harden php-location settings. Resent-From: Bruno Victal <mirai@makinata.eu> Original-Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org> Resent-CC: guix-patches@gnu.org Resent-Date: Wed, 05 Apr 2023 15:35:02 +0000 Resent-Message-ID: <handler.62678.B.168070889428084@debbugs.gnu.org> Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 62678 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 62678@debbugs.gnu.org Cc: Bruno Victal <mirai@makinata.eu> X-Debbugs-Original-To: guix-patches@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.168070889428084 (code B ref -1); Wed, 05 Apr 2023 15:35:02 +0000 Received: (at submit) by debbugs.gnu.org; 5 Apr 2023 15:34:54 +0000 Received: from localhost ([127.0.0.1]:52459 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <debbugs-submit-bounces@debbugs.gnu.org>) id 1pk59j-0007Ia-IW for submit@debbugs.gnu.org; Wed, 05 Apr 2023 11:34:54 -0400 Received: from lists.gnu.org ([209.51.188.17]:49246) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <mirai@makinata.eu>) id 1pk59h-0007IT-On for submit@debbugs.gnu.org; Wed, 05 Apr 2023 11:34:38 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <mirai@makinata.eu>) id 1pk59h-00043G-7M for guix-patches@gnu.org; Wed, 05 Apr 2023 11:34:37 -0400 Received: from smtpmciv1.myservices.hosting ([185.26.107.237]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <mirai@makinata.eu>) id 1pk59f-0007ft-5U for guix-patches@gnu.org; Wed, 05 Apr 2023 11:34:36 -0400 Received: from mail1.netim.hosting (unknown [185.26.106.173]) by smtpmciv1.myservices.hosting (Postfix) with ESMTP id E7E4F2098E for <guix-patches@gnu.org>; Wed, 5 Apr 2023 17:34:25 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail1.netim.hosting (Postfix) with ESMTP id 9431E800AA; Wed, 5 Apr 2023 17:34:25 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at mail1.netim.hosting Received: from mail1.netim.hosting ([127.0.0.1]) by localhost (mail1-2.netim.hosting [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 7AgZigszt7Uo; Wed, 5 Apr 2023 17:34:25 +0200 (CEST) Received: from guix-nuc.home.arpa (unknown [10.192.1.83]) (Authenticated sender: lumen@makinata.eu) by mail1.netim.hosting (Postfix) with ESMTPSA id EA9A2800A9; Wed, 5 Apr 2023 17:34:24 +0200 (CEST) From: Bruno Victal <mirai@makinata.eu> Date: Wed, 5 Apr 2023 16:34:08 +0100 Message-Id: <ad598ba1ce644a29c997139c82d790a3ac65f4b4.1680708757.git.mirai@makinata.eu> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=185.26.107.237; envelope-from=mirai@makinata.eu; helo=smtpmciv1.myservices.hosting X-Spam_score_int: -18 X-Spam_score: -1.9 X-Spam_bar: - X-Spam_report: (-1.9 / 5.0 requ) BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: <guix-patches.gnu.org> List-Unsubscribe: <https://lists.gnu.org/mailman/options/guix-patches>, <mailto:guix-patches-request@gnu.org?subject=unsubscribe> List-Archive: <https://lists.gnu.org/archive/html/guix-patches> List-Post: <mailto:guix-patches@gnu.org> List-Help: <mailto:guix-patches-request@gnu.org?subject=help> List-Subscribe: <https://lists.gnu.org/mailman/listinfo/guix-patches>, <mailto:guix-patches-request@gnu.org?subject=subscribe> Errors-To: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org Sender: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org X-getmail-retrieved-from-mailbox: Patches |
Series |
[bug#62678] services: nginx: Harden php-location settings.
|
|
Commit Message
Bruno Victal
April 5, 2023, 3:34 p.m. UTC
Incorporate advice from [2], which mitigates httpoxy[1] vulnerability and disallows passing non-php files to the PHP backend. [1]: <https://httpoxy.org/> [2]: <https://www.nginx.com/resources/wiki/start/topics/examples/phpfcgi/>, note 4. * gnu/services/web.scm (nginx-php-location): Only pass existing php files to backend. Mitigate httpoxy vulnerability. --- Tested with: make check-system TESTS="nginx php-fpm" gnu/services/web.scm | 4 ++++ 1 file changed, 4 insertions(+) base-commit: 6311493d7a6271bfbc51f4693857f9a12fe9965d
Comments
I wonder if we should at least make the HTTP_PROXY variable configurable. It may need to be set to something else then "" in some scenarios. I don't know...
Hi Jonathan, On 2023-04-05 21:19, Jonathan Brielmaier wrote: > I wonder if we should at least make the HTTP_PROXY variable > configurable. It may need to be set to something else then "" in some > scenarios. I don't know... No, there's no legitimate reason for this, since 'PROXY' is not a standard HTTP header according to [1]. PROXY being passed to a cgi application as HTTP_PROXY is what the exploit is about, since HTTP_PROXY is recognized as a variable for configuring proxies (for curl, wget, etc.) Allowing HTTP_PROXY to be set remotely (due to a confusion with the non-standard 'PROXY' header) is simply incomprehensible. Regarding user intent, that is, configuring the proxy used by the cgi application by setting HTTP_PROXY via nginx? I don't have this use-case but IMO it feels like an extreme poor design, since it's exploiting a name confusion to change the system environment variables for the cgi application. If for some reason you really need this, you can always use the regular nginx-location-configuration to manually craft a php-location. [1]: https://www.iana.org/assignments/http-fields/http-fields.xhtml Cheers, Bruno
Hi Bruno, Bruno Victal 写道: > Incorporate advice from [2], which mitigates httpoxy[1] > vulnerability and > disallows passing non-php files to the PHP backend. > > [1]: <https://httpoxy.org/> > [2]: > <https://www.nginx.com/resources/wiki/start/topics/examples/phpfcgi/>, > note 4. This is a better comment than commit message. I made it so and pushed your changes as commit cbc14b3baea457cf2718b85f767d39ff3911ce91. Thanks! T G-R
diff --git a/gnu/services/web.scm b/gnu/services/web.scm index d56e893527..f5ed027bb4 100644 --- a/gnu/services/web.scm +++ b/gnu/services/web.scm @@ -1123,6 +1123,10 @@ (define* (nginx-php-location (uri "~ \\.php$") (body (list "fastcgi_split_path_info ^(.+\\.php)(/.+)$;" + ;; Mitigate https://httpoxy.org/ vulnerabilities + "fastcgi_param HTTP_PROXY \"\";" + ;; Only pass existing php files to the backend. + "if (!-f $document_root$fastcgi_script_name) { return 404; }" (string-append "fastcgi_pass unix:" socket ";") "fastcgi_index index.php;" (list "include " nginx-package "/share/nginx/conf/fastcgi.conf;")))))