Blocking httpoxy Requests In nginx

With the httpoxy vulnerability making headlines in the security circles right now, I decided to get more aggressive in guarding my own sites against it, specifically by outright blocking any such requests. Turns out, it’s not hard to do at all!

My first approach was to simply “erase” the Proxy header from any requests that may include it. While the httpoxy page shows how to do this in your fastcgi_params file, I took it a step further and added the following line to my http block:

proxy_set_header Proxy "";

While this would be effective in stopping the attack (even against services that may not use my fastcgi_params file), I wanted to get more aggressive: The Proxy header has no business being in legitimate requests at all, so I wanted to outright block those requests altogether.

Turns out this was pretty simple as well:

if ($http_proxy) {
    return 403 
<title>403 Proxy Header Not Allowed</title>
<body style='background-color:red;color:white;'>
<center><h1>Proxy Header Not Allowed</h1></center>
<center><a href=''>httpoxy vulnerability information</a></center>

Notice that I did take the time to produce an informative response to end users who might see this message; while I don’t expect anyone to see it except would-be hackers and script kiddies trying to exploit it (and, thus, who already know about it), it doesn’t hurt just in case someone who isn’t expecting this does happen to see it.

For this to work, though, it has to be within your server block for each host you want to protect; fortunately for me, I already have a snippet of default_locations that I include into every host’s server block, so I added this snippet to that file and one quick reload later all of my hosts are now protected.

Of course, following the principles of “Defense-In-Depth”, I also follow the recommendation of the httpoxy page in not passing the header through via my fastcgi_params file.

This entry was posted in Security and tagged , , , , . Bookmark the permalink.