Reverse Proxy Misconfigurations
A reverse proxy is a server that sits between clients and backend servers, forwarding client requests to the appropriate server while hiding the backend infrastructure and often providing load balancing or caching. Misconfigurations in a reverse proxy, such as improper access controls, lack of input sanitization in proxy_pass directives, or trusting client-provided headers like X-Forwarded-For, can lead to vulnerabilities like unauthorized access, directory traversal, or exposure of internal resources.
Summary
Tools
- yandex/gixy - Nginx configuration static analyzer.
- shiblisec/Kyubi - A tool to discover Nginx alias traversal misconfiguration.
-
laluka/bypass-url-parser - Tool that tests MANY url bypasses to reach a 40X protected page.
Methodology
HTTP Headers
Since headers like X-Forwarded-For
, X-Real-IP
, and True-Client-IP
are just regular HTTP headers, a client can set or override them if it can control part of the traffic path—especially when directly connecting to the application server, or when reverse proxies are not properly filtering or validating these headers.
X-Forwarded-For
X-Forwarded-For
is an HTTP header used to identify the originating IP address of a client connecting to a web server through an HTTP proxy or a load balancer.
When a client makes a request through a proxy or load balancer, that proxy adds an X-Forwarded-For header containing the client’s real IP address.
If there are multiple proxies (a request passes through several), each proxy adds the address from which it received the request to the header, comma-separated.
Nginx can override the header with the client's real IP address.
X-Real-IP
X-Real-IP
is another custom HTTP header, commonly used by Nginx and some other proxies, to forward the original client IP address. Rather than including a chain of IP addresses like X-Forwarded-For, X-Real-IP contains only a single IP: the address of the client connecting to the first proxy.
True-Client-IP
True-Client-IP
is a header developed and standardized by some providers, particularly by Akamai, to pass the original client’s IP address through their infrastructure.
Nginx
Off By Slash
Nginx matches incoming request URIs against the location blocks defined in your configuration.
location /app/
matches requests to/app/
,/app/foo
,/app/bar/123
, etc.location /app
(no trailing slash) matches/app*
(i.e.,/application
,/appfile
, etc.),
This means in Nginx, the presence or absence of a slash in a location block changes the matching logic.
server {
location /app/ {
# Handles /app/ and anything below, e.g., /app/foo
}
location /app {
# Handles only /app with nothing after OR routes like /application, /appzzz
}
}
Example of a vulnerable configuration: An attacker requesting /styles../secret.txt
resolves to /path/styles/../secret.txt
Missing Root Location
The root /etc/nginx;
directive sets the server's root directory for static files.
The configuration doesn't have a root location /
, it will be set globally set.
A request to /nginx.conf
would resolve to /etc/nginx/nginx.conf
.
server {
root /etc/nginx;
location /hello.txt {
try_files $uri $uri/ =404;
proxy_pass http://127.0.0.1:8080/;
}
}
Caddy
Template Injection
The provided Caddy web server config uses the templates
directive, which allows dynamic content rendering with Go templates.
This tells Caddy to process the response string as a template, and interpolate any variables (using Go template syntax) present in the referenced request header.
In this curl request, the attacker supplied as Referer
header a Go template expression: {{readFile "etc/passwd"}}
.
HTTP/1.1 200 OK
Content-Length: 716
Content-Type: text/plain; charset=utf-8
Server: Caddy
Date: Thu, 24 Jul 2025 08:00:50 GMT
You came from root:x:0:0:root:/root:/bin/sh
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
Because Caddy is running the templates directive, it will evaluate anything in curly braces inside the context, including things from untrusted input. The readFile
function is available in Caddy templates, so the attacker's input causes Caddy to actually read /etc/passwd
and insert its content into the HTTP response.
Payload | Description |
---|---|
{{env "VAR_NAME"}} |
Get an environment variable |
{{listFiles "/"}} |
List all files in a directory |
{{readFile "path/to/file"}} |
Read a file |
Labs
- Root Me - Nginx - Alias Misconfiguration
- Root Me - Nginx - Root Location Misconfiguration
- Root Me - Nginx - SSRF Misconfiguration
- Detectify - Vulnerable Nginx