Skip to content

Fixed IP spoofing vulnerability#243

Open
ashboundscar wants to merge 1 commit into
system2k:masterfrom
ashboundscar:fix-ip-spoofing
Open

Fixed IP spoofing vulnerability#243
ashboundscar wants to merge 1 commit into
system2k:masterfrom
ashboundscar:fix-ip-spoofing

Conversation

@ashboundscar
Copy link
Copy Markdown

If the Nginx proxy server forwards requests to the backend through 127.0.0.1 and doesn't clear headers sent by the client, any user can send their own "X-Real-IP" header and the backend will trust it.

I tested this, and with a simple 7-line userscript I was able to bypass the IP check and spoof my IP address to any value.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant