Results 1 to 5 of 5
-
29th Aug 2011, 07:00 AM #1OPMember
Securing php-fpm with nginx
Found this one while searching how to secure php-fpm.
masterb56 Reviewed by masterb56 on . Securing php-fpm with nginx Found this one while searching how to secure php-fpm. Source: https://nealpoole.com/blog/2011/04/setting-up-php-fastcgi-and-nginx-dont-trust-the-tutorials-check-your-configuration/ Rating: 5
-
29th Aug 2011, 07:48 AM #2MemberFortunately, the vulnerable servers are easy do identify and fix. Example: http://example.com/path/to/file.png ? a static object served by the vulnerable server. A crafted request to http://example.com/path/to/file.png/index.php for example should return 404. If it returns 500, then thing?s are bad. Worse though if it?s a 2xx or 3xx aka file.png = valid PHP.
Whats the fix? The article wasn't exactly clear and simple.
-
29th Aug 2011, 08:18 AM #3OPMember
There's a few steps enumerated in the article. Try cgi.fix_pathinfo to php.ini fix he stated.
Anyway here's another one, looks like the EPEL nginx default installation is also vulnerable, so watch outSecure your nginx's!
The attack itself is simple: a malicious user who makes a request to http://example.com/file.ext%00.php causes file.ext to be parsed as PHP. If an attacker can control the contents of a file served up by nginx (ie: using an avatar upload form) the result is arbitrary code execution. This vulnerability can not be mitigated by nginx configuration settings like try_files or PHP configuration settings like cgi.fix_pathinfo: the only defense is to upgrade to a newer version of nginx or to explicitly block potentially malicious requests to directories containing user-controlled content.
-
29th Aug 2011, 08:20 AM #4Member
Some users posted they had an issue with the pathinfo fix messing up their wordpress urls..
I tried this solution:
Code:location ~* \.(js|css|png|jpg|jpeg|gif|ico)$ { expires 1y; log_not_found off; } location ~ \.php$ { include /etc/nginx/fastcgi_params; fastcgi_index index.php; fastcgi_param SCRIPT_FILENAME /home/www/dubstepremix.org/public_html$fastcgi_script_name; if ($uri !~ "^/images/") { fastcgi_pass 127.0.0.1:9000; } } }
I did try http://mywebsite.com/images/picture.png/index.php, it now correctly gives the 404 Error.
EDIT: Just saw your 2nd post after posting this one, ...arggh now I have to check what version of Nginx I have an update it too lol. Thanks for bringing these things up!
After publishing my previous blog post on PHP, nginx configuration, and potential arbitrary code execution, I came across a separate null-byte injection vulnerability in older versions of nginx (0.5.*, 0.6.*, 0.7 <= 0.7.65, 0.8 <= 0.8.37). By taking advantage of this vulnerability, an attacker can cause a server that uses PHP-FastCGI to execute any publicly accessible file on the server as PHP.
-
29th Aug 2011, 08:46 AM #5OPMember
Doing try_files $uri =404 seem to work for me with wordpress. Put that one on both your static and php files. And yeah if you could update nginx to 1.0.5 latest stable version that would be great
Sponsored Links
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Similar Threads
-
[TUT] Securing /tmp and /dev/shm partion
By .:Raymond:. in forum Technical and Security TutorialsReplies: 6Last Post: 9th Jun 2011, 08:47 AM -
[TUT] Securing SSH a bit ;)
By .:Raymond:. in forum Technical and Security TutorialsReplies: 13Last Post: 9th Jun 2011, 08:29 AM -
[Selling] VPS Securing Services
By iL < in forum Completed TransactionsReplies: 2Last Post: 31st Mar 2010, 05:13 AM -
Need help securing VPS!!
By lukip006 in forum Server ManagementReplies: 5Last Post: 31st Aug 2009, 04:14 PM -
securing vb forum
By lenney in forum vBulletinReplies: 16Last Post: 19th Jul 2009, 08:43 PM
themaLeecher - leech and manage...
Version 5.03 released. Open older version (or...