-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[radar-gateway] Configure radar-gataway to mitigate XSS attack vector #253
Conversation
Nginx decodes the uri before passing it to the backend server. This is dangerous because it can allow for XSS attacks. Grizzly servers have a bug where they send the decoded uri as part of error messages (see Graylog2/graylog2-server#3171). To prevent this, we need to re-encode the uri ($request_uri is the original encoded request) before passing it to the Grizzly server.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good work, lets keep track of the XSS stuff in an issue as we do quite some rewrites?
do we need this in other services which use Grizzly (push-endpoint, rest-source-auth, etc)? |
@pvannierop Could we implement this in the radar-gateway helm chart instead of this repository? |
@yatharthranjan I was not aware of these other components using Grizzly. But yes, if there is Grizzly in use, here the fix should also better be applied. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could we implement this in the radar-gateway helm chart instead of this repository?
@keyvaann Yes, we can do this. I will make the PR and close this one. |
New PR is here |
Background
Nginx decodes the uri before passing it to the backend server. This is dangerous because it can allow for XSS attacks. Grizzly servers have a bug where they send the decoded uri as part of error messages (see Graylog2/graylog2-server#3171).
Change
To prevent XSS attacks, we need to re-encode the uri ($request_uri is the original encoded request) before passing it to the Grizzly server.