mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-26 01:45:54 +03:00
[GH-ISSUE #2966] When "block common exploits" is enabled, is there a way to bypass certain rules? #2021
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#2021
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @africa1207 on GitHub (May 31, 2023).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/2966
I have a PHP application that can be accessed via HTTPS by configuring proxy rules in Nginx (I have enabled block common exploits in Nginx). For example, I can access the application using URLs like https://demo.test.com/my.php or https://demo.test.com/app/other.php. However, when I try to access https://demo.test.com/app/other.php?img=/source/test.jpg, it returns a 403 error due to triggering a vulnerability policy. I cannot modify the PHP application. Is there a way to solve this issue by customizing the proxy rule configuration or using advanced configurations?
@github-actions[bot] commented on GitHub (Jan 18, 2024):
Issue is now considered stale. If you want to keep it open, please comment 👍
@github-actions[bot] commented on GitHub (Mar 4, 2025):
Issue was closed due to inactivity.