Acknowledgement sent
to Bruno Victal <mirai@makinata.eu>:
New bug report received and forwarded. Copy sent to guix-patches@gnu.org.
(Wed, 05 Apr 2023 15:35:02 GMT) (full text, mbox, link).
I wonder if we should at least make the HTTP_PROXY variable
configurable. It may need to be set to something else then "" in some
scenarios. I don't know...
Information forwarded
to guix-patches@gnu.org: bug#62678; Package guix-patches.
(Thu, 06 Apr 2023 13:12:01 GMT) (full text, mbox, link).
Hi Jonathan,
On 2023-04-05 21:19, Jonathan Brielmaier wrote:
> I wonder if we should at least make the HTTP_PROXY variable
> configurable. It may need to be set to something else then "" in some
> scenarios. I don't know...
No, there's no legitimate reason for this, since 'PROXY' is not
a standard HTTP header according to [1]. PROXY being passed to a cgi application
as HTTP_PROXY is what the exploit is about, since HTTP_PROXY is recognized as
a variable for configuring proxies (for curl, wget, etc.)
Allowing HTTP_PROXY to be set remotely (due to a confusion with the non-standard 'PROXY' header)
is simply incomprehensible.
Regarding user intent, that is, configuring the proxy used by the cgi application by
setting HTTP_PROXY via nginx?
I don't have this use-case but IMO it feels like an extreme poor design, since it's
exploiting a name confusion to change the system environment variables for the
cgi application.
If for some reason you really need this, you can always use the regular
nginx-location-configuration to manually craft a php-location.
[1]: https://www.iana.org/assignments/http-fields/http-fields.xhtml
Cheers,
Bruno
Added tag(s) security.
Request was from Bruno Victal <mirai@makinata.eu>
to control@debbugs.gnu.org.
(Thu, 22 Jun 2023 13:34:02 GMT) (full text, mbox, link).
Reply sent
to Tobias Geerinckx-Rice <me@tobias.gr>:
You have taken responsibility.
(Fri, 07 Jul 2023 14:23:02 GMT) (full text, mbox, link).
Notification sent
to Bruno Victal <mirai@makinata.eu>:
bug acknowledged by developer.
(Fri, 07 Jul 2023 14:23:02 GMT) (full text, mbox, link).
Hi Bruno,
Bruno Victal 写道:
> Incorporate advice from [2], which mitigates httpoxy[1]
> vulnerability and
> disallows passing non-php files to the PHP backend.
>
> [1]: <https://httpoxy.org/>
> [2]:
> <https://www.nginx.com/resources/wiki/start/topics/examples/phpfcgi/>,
> note 4.
This is a better comment than commit message. I made it so and
pushed your changes as commit
cbc14b3baea457cf2718b85f767d39ff3911ce91.
Thanks!
T G-R
Debbugs is free software and licensed under the terms of the
GNU Public License version 2. The current version can be
obtained from https://bugs.debian.org/debbugs-source/.