mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 09:25:55 +03:00
[GH-ISSUE #1655] Log4j Header recognition #1239
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#1239
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @lvefferen on GitHub (Dec 15, 2021).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1655
Can Nginx Proxy Manager detect (and block) scan/attacks done with Log4j exploit? by enabling "Block Common Exploits" option?
@chaptergy commented on GitHub (Dec 15, 2021):
You can add something via the advanced config to temporarily try and reduce the risk. However this should NOT be more than a very temporary workaround until you have patched your Java applications! That's why this shouldn't be a default "exploit" to block. Furthermore as every single header and other content needs to be scanned for various specific strings, and this is only possible by using a lua script, this comes with a huge performance penalty.
But as I said for a temporary thing, you can use the advanced config and using a script like the one created by infiniroot: