mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 09:25:55 +03:00
[GH-ISSUE #4423] "Cache Assets" option caches responses with cookies #2832
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#2832
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ssddanbrown on GitHub (Mar 8, 2025).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/4423
Checklist
jc21/nginx-proxy-manager:latestdocker image?Describe the bug
Hello,
I believe that the "Cache Assets" is currently caching responses which contain cookies, which isn't something I'd expect by default (at least without warning).
This can lead to responses with session cookies being cached and provided back to other users.
This is something I discovered when supporting a user of my software, who was using nginx-proxy-manager with this option enabled, who found that their login accounts would change somewhat randomly.
I believe this is down to the following
proxy_ignore_headersline:github.com/NginxProxyManager/nginx-proxy-manager@79d28f03d0/docker/rootfs/etc/nginx/conf.d/include/assets.conf (L9)When reading initially, I thought that this line was specifically preventing responses with
Set-Cookieheaders from being cached, but this is not the case.From what I understand, by default nginx won't cache proxy responses with the
Set-Cookiefield following the guidance here:The
proxy_ignore_headersoption then tells nginx to ignore certain headers for its own internal processing. It does not ignore responses that have these headers as I initially assumed when reading.In this case, since
Set-Cookieis used with this option, it's essentially telling nginx to ignore its default behaviour and allowSet-Cookieresponses to be cached.Testing/Replication
I tested this via a simple PHP script to set a cookie:
Script
Then I ran that script with
php -S 0.0.0.0:8000 server.php, then created a proxy server to that host, with the "Cache Assets" option enabled. A request to/cat.pngwould then become cached.Then I removed
Set-Cookiefrom line 9 of the/etc/nginx/conf.d/include/assets.conf, restarted the container, then tested again via a different endpoint (/dog.png) and observed that the response was no longer cached.Nginx Proxy Manager Version
v2.12.3
Expected behavior
Responses with cookies applied should not be cached (by default).
Operating System
Fedora 41
Note: I did think about reporting this as a security issue, since it can interplay with user sessions via cookies, but I couldn't find any security reporting details or contact details, but instead found past similar requests for security contact details go unanswered. Should be a niche scenario anyway (instances with cache option active, where assets could be served with relevant cookies).
@Adiack06 commented on GitHub (Mar 21, 2025):
I have had the same issue while using book-stack (the software @ssddanbrown makes) with this nginx proxy setting enabled
@faulpeltz commented on GitHub (Apr 3, 2025):
@ssddanbrown This causes problems with self-hosted GitLab instances as well, because some assets like user-profile images contain a cookie header (which they probably shouldn't), causing intermittent session takeover across accounts
I think NPM should, in a standard setting, never cache Set-Cookie headers or aggressively override caching based on file extension alone, instead I suggest maybe have a "standard" "force/aggressive" cache mode if you really need it?
@francescocaponio commented on GitHub (Apr 16, 2025):
As a reference, I'm attaching the link to gitlab's issue.
Please note that the issue happens even if the Cache Assets option is disabled from the UI.
@ssddanbrown commented on GitHub (Apr 16, 2025):
@francescocaponio Have you verified that from a (relatively) clean state? From when I opened this, it looks like the relevant nginx config was only at play with the setting enabled, so would be surprised unless there's some other level of caching config, or caching layer in play, or retained session after toggling the caching option.
@francescocaponio commented on GitHub (Apr 16, 2025):
We noticed it on our instance, but also user alexhoisl on the gitlab issue tracker is experiencing the same problem with cache disabled.
@ssddanbrown commented on GitHub (Apr 16, 2025):
@francescocaponio They confirm, in their next comment, that information was wrong and later confirm that they no longer have the issue with caching disabled. Since this applies to cookies those wrong cookies will remain in browsers for a while, so even after changing the setting existing sessions/cookies could need to expire or be deleted/invalidated otherwise wrong logins (or other problems caused by mixed cookies) may persist.
@francescocaponio commented on GitHub (Apr 16, 2025):
Now I see it, sorry, but I read it fast.
We should do a more consistent test here too. In our environment we have two instances of npm, one from external ips and one from internal ones. They were configured differently for the caching option. Let me check it better, but it's quite difficult to make it happen in a reliable way.
@ahoisl commented on GitHub (Apr 16, 2025):
Sorry for the confusion!
Yes, after disabling "Cache Assets" the GitLab authentication problem was fixed.
@github-actions[bot] commented on GitHub (Oct 19, 2025):
Issue is now considered stale. If you want to keep it open, please comment 👍
@ssddanbrown commented on GitHub (Oct 19, 2025):
👍 I think it's worth keeping open @github-actions bot!